Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing

[1]  Charalampos Z. Patrikakis,et al.  Security and Privacy in Pervasive Computing , 2007, IEEE Pervasive Computing.

[2]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[3]  Max Mühlhäuser,et al.  Multilaterally Secure Ubiquitous Auditing , 2010, Intelligent Networking, Collaborative Systems and Applications.

[4]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[5]  Stefan G. Weber On Transaction Pseudonyms with Implicit Attributes , 2012, IACR Cryptol. ePrint Arch..

[6]  Norbert A. Streitz,et al.  The Disappearing Computer, Interaction Design, System Infrastructures and Applications for Smart Environments , 2007, The Disappearing Computer.

[7]  Stefan G. Weber Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.

[8]  Mark Weiser The computer for the 21st century , 1991 .

[9]  Max Mühlhäuser,et al.  Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[10]  Felix Flentge,et al.  Designing Context-Aware HCI for Collaborative Emergency Management , 2008 .

[11]  Stefan Weber Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections , 2008 .

[12]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[13]  Max Mühlhäuser,et al.  MundoMessage: enabling trustworthy ubiquitous emergency communication , 2011, ICUIMC '11.

[14]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[15]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[16]  Max Mühlhäuser,et al.  Concepts and Scheme for Multilaterally Secure, User-Friendly Attribute-Based Messaging , 2010 .

[17]  Max Mühlhäuser,et al.  Towards Trustworthy Identity and Access Management for the Future Internet , 2010 .

[18]  Stefan G. Weber Multilaterally secure pervasive cooperation , 2012, J. Ambient Intell. Smart Environ..

[19]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[20]  Johannes A. Buchmann,et al.  On Coercion-Resistant Electronic Elections with Linear Work , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[21]  Stefan G. Weber A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes , 2012, Inf. Secur. J. A Glob. Perspect..

[22]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.