Security and Privacy in Pervasive Networks
暂无分享,去创建一个
[1] Vandana Dhingra,et al. Pervasive Computing: Paradigm for New Era Computing , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[2] Christian Schaefer,et al. A Security-by-Contract Architecture for Pervasive Services , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[3] Thomas Walter,et al. Security in Pervasive Computing Calling for new Security Principles , 2007, IEEE International Conference on Pervasive Services.
[4] Sheikh Iqbal Ahamed,et al. Privacy in Pervasive Computing and Open Issues , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[5] Yann Gripay,et al. Context-Sensitive Security Framework for Pervasive Environments , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).
[6] Lionel Brunie,et al. Expressing and Interpreting User Intention in Pervasive Service Environments , 2005, J. Digit. Inf. Manag..
[7] Marcela D. Rodríguez,et al. Supporting quality of privacy (QoP) in pervasive computing , 2005, Sixth Mexican International Conference on Computer Science (ENC'05).
[8] Mingxuan Yuan,et al. Dynamic privacy management: a plug-in service for the middleware in pervasive computing , 2005, Mobile HCI.
[9] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[10] Jadwiga Indulska,et al. Extending context models for privacy in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[11] Antonio Corradi,et al. A context-centric security middleware for service provisioning in pervasive computing , 2005, The 2005 Symposium on Applications and the Internet.
[12] Ravi S. Sandhu,et al. Models, protocols, and architectures for secure pervasive computing: challenges and research directions , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[13] Christian Damsgaard Jensen,et al. Trust enhanced ubiquitous payment without too much privacy loss , 2004, SAC '04.
[14] Paolo Bellavista,et al. Context-Aware Middleware for Resource Management in the Wireless Internet , 2003, IEEE Trans. Software Eng..
[15] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[16] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[17] Mohammad S. Obaidat,et al. Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold , 2008, SECRYPT.
[18] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..