Security and Privacy in Pervasive Networks

[1]  Vandana Dhingra,et al.  Pervasive Computing: Paradigm for New Era Computing , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[2]  Christian Schaefer,et al.  A Security-by-Contract Architecture for Pervasive Services , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[3]  Thomas Walter,et al.  Security in Pervasive Computing Calling for new Security Principles , 2007, IEEE International Conference on Pervasive Services.

[4]  Sheikh Iqbal Ahamed,et al.  Privacy in Pervasive Computing and Open Issues , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[5]  Yann Gripay,et al.  Context-Sensitive Security Framework for Pervasive Environments , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).

[6]  Lionel Brunie,et al.  Expressing and Interpreting User Intention in Pervasive Service Environments , 2005, J. Digit. Inf. Manag..

[7]  Marcela D. Rodríguez,et al.  Supporting quality of privacy (QoP) in pervasive computing , 2005, Sixth Mexican International Conference on Computer Science (ENC'05).

[8]  Mingxuan Yuan,et al.  Dynamic privacy management: a plug-in service for the middleware in pervasive computing , 2005, Mobile HCI.

[9]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[10]  Jadwiga Indulska,et al.  Extending context models for privacy in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[11]  Antonio Corradi,et al.  A context-centric security middleware for service provisioning in pervasive computing , 2005, The 2005 Symposium on Applications and the Internet.

[12]  Ravi S. Sandhu,et al.  Models, protocols, and architectures for secure pervasive computing: challenges and research directions , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[13]  Christian Damsgaard Jensen,et al.  Trust enhanced ubiquitous payment without too much privacy loss , 2004, SAC '04.

[14]  Paolo Bellavista,et al.  Context-Aware Middleware for Resource Management in the Wireless Internet , 2003, IEEE Trans. Software Eng..

[15]  James A. Landay,et al.  Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..

[16]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[17]  Mohammad S. Obaidat,et al.  Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold , 2008, SECRYPT.

[18]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..