Exploring Design Directions for Wearable Privacy
暂无分享,去创建一个
Katharina Krombholz | Edgar Weippl | Adrian Dabrowski | Matthew Smith | Katharina Krombholz | E. Weippl | Matthew Smith | Adrian Dabrowski
[1] Brent Waters,et al. Privacy management for portable recording devices , 2004, WPES '04.
[2] S. Sastry,et al. Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[3] Shwetak N. Patel,et al. BlindSpot: Creating Capture-Resistant Spaces , 2009, Protecting Privacy in Video Surveillance.
[4] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[5] Faisal Z. Qureshi,et al. Negotiating Privacy Preferences in Video Surveillance Systems , 2011, IEA/AIE.
[6] Sameer Patil,et al. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice , 2012, SOUPS.
[7] Edgar R. Weippl,et al. Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[8] Matthew Smith,et al. SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it , 2013, WiSec '13.
[9] Tadayoshi Kohno,et al. In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.
[10] Eduardo Mena,et al. Demo: FaceBlock: privacy-aware pictures for google glass , 2014, MobiSys.
[11] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.
[12] Ashwin Machanavajjhala,et al. MarkIt: privacy markers for protecting visual secrets , 2014, UbiComp Adjunct.
[13] David J. Crandall,et al. ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras , 2014, ArXiv.
[14] Helen J. Wang,et al. World-Driven Access Control for Continuous Sensing , 2014, CCS.
[15] Edgar R. Weippl,et al. Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing , 2015, Financial Cryptography Workshops.
[16] David J. Crandall,et al. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras , 2015, CHI.
[17] Lorrie Faith Cranor,et al. A Design Space for Effective Privacy Notices , 2015, SOUPS.
[18] Karen Lamb,et al. Users’ Privacy Perceptions About Wearable Technology: Examining Influence of Personality, Trust, and Usability , 2016 .