Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing
暂无分享,去创建一个
[1] Charalampos Z. Patrikakis,et al. Security and Privacy in Pervasive Computing , 2007, IEEE Pervasive Computing.
[2] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[3] Max Mühlhäuser,et al. Multilaterally Secure Ubiquitous Auditing , 2010, Intelligent Networking, Collaborative Systems and Applications.
[4] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[5] Stefan G. Weber. On Transaction Pseudonyms with Implicit Attributes , 2012, IACR Cryptol. ePrint Arch..
[6] Norbert A. Streitz,et al. The Disappearing Computer, Interaction Design, System Infrastructures and Applications for Smart Environments , 2007, The Disappearing Computer.
[7] Stefan G. Weber. Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.
[8] Mark Weiser. The computer for the 21st century , 1991 .
[9] Max Mühlhäuser,et al. Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[10] Felix Flentge,et al. Designing Context-Aware HCI for Collaborative Emergency Management , 2008 .
[11] Stefan Weber. Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections , 2008 .
[12] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[13] Max Mühlhäuser,et al. MundoMessage: enabling trustworthy ubiquitous emergency communication , 2011, ICUIMC '11.
[14] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[15] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[16] Max Mühlhäuser,et al. Concepts and Scheme for Multilaterally Secure, User-Friendly Attribute-Based Messaging , 2010 .
[17] Max Mühlhäuser,et al. Towards Trustworthy Identity and Access Management for the Future Internet , 2010 .
[18] Stefan G. Weber. Multilaterally secure pervasive cooperation , 2012, J. Ambient Intell. Smart Environ..
[19] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[20] Johannes A. Buchmann,et al. On Coercion-Resistant Electronic Elections with Linear Work , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[21] Stefan G. Weber. A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes , 2012, Inf. Secur. J. A Glob. Perspect..
[22] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.