共 50 条
- [31] Security and privacy analysis of RFID authentication protocol for ubiquitous computing PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
- [32] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +
- [34] A privacy-aware service protocol for ubiquitous computing environments EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 619 - 628
- [37] Routing through the mist: Privacy preserving communication in ubiquitous computing environments 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 74 - 83
- [38] A flexible, privacy-preserving authentication framework for ubiquitous computing environments 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 771 - 776
- [39] Personalization and privacy in ubiquitous computing resolving the conflict by legally binding commitments 9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 447 - 450
- [40] Composite Sensor Model and Security Agent to Improve Privacy of Ubiquitous Computing 2008 FIRST IEEE INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS, PROCEEDINGS, 2008, : 159 - 164