共 50 条
- [41] A privacy agent in context-aware ubiquitous computing environments COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 196 - 205
- [42] Towards an architecture for balancing privacy and traceability in ubiquitous computing environments ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 958 - 964
- [43] How to Understand AI's Privacy Threats in Ubiquitous Computing PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936
- [44] Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing 2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 364 - 367
- [46] Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners Requirements Engineering, 2023, 28 : 177 - 194
- [47] Devices that tell on you: Privacy trends in consumer ubiquitous computing USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 55 - 70
- [48] Security and privacy analysis of RFID authentication protocol for ubiquitous computing PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
- [49] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +