TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones
暂无分享,去创建一个
Heinrich Hußmann | Alexander De Luca | Julian Seifert | Bettina Conradi | Julian Seifert | A. D. Luca | H. Hussmann | B. Conradi | Bettina Conradi
[1] Andreas Krause,et al. SenSay: a context-aware mobile phone , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..
[2] S. Krishnamurthy,et al. Context-Based Adaptation of Mobile Phones Using Near-Field Communication , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.
[3] Sumit Mittal,et al. Context-Based Adaptation of Mobile Phones Ussing Near-Field Communication , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[4] Frank Stajano. One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA , 2004, Security Protocols Workshop.
[5] Alexander De Luca,et al. Threat Awareness - Social Impacts of Privacy Aware Ubiquitous Computing , 2007 .
[6] Frank Stajano. Will your digital butlers betray you? , 2004, WPES '04.
[7] Lars Erik Holmquist,et al. UbiComp 2002: Ubiquitous Computing , 2002 .
[8] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[9] Stuart E. Schechter,et al. Can i borrow your phone?: understanding concerns when sharing mobile phones , 2009, CHI.
[10] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[11] Pertti Huuskonen,et al. Understanding privacy regulation in ubicomp interactions , 2008, Personal and Ubiquitous Computing.