Inherent Tradeoffs in Ubiquitous Computing Services
暂无分享,去创建一个
[1] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[2] Marc Langheinrich,et al. Privacy Invasions in Ubiquitous Computing , 2002 .
[3] Latanya Sweeney. Privacy-Preserving Surveillance Using Databases from Daily Life , 2005 .
[4] Karsten Weber,et al. The next step: privacy invasions by biometrics and ICT implants , 2006, UBIQ.
[5] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[6] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[7] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[8] Mahadev Satyanarayanan. Privacy: The Achilles Heel of Pervasive Computing? , 2003 .
[9] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[10] Andreas Heinemann,et al. Survey on Location Privacy in Pervasive Computing , 2005 .