-
2
-
-
0346869574
-
Designing for ubiquity: The perception of privacy
-
See R. BECKWITH: 'Designing for ubiquity: the perception of privacy', Pervasive Computing, 2003, 2, (2), 40-46 and F. STAJANO and J. CROWCROFT: The butt of the iceberg: hidden security problems of ubiquitous systems', in Ambient Intelligence: Impact on Embedded-System Design, (ed. A. A. Basten, M. Geilen and H. de Groot); 2003, Dordrecht, Kluwer.
-
(2003)
Pervasive Computing
, vol.2
, Issue.2
, pp. 40-46
-
-
Beckwith, R.1
-
3
-
-
0346869574
-
The butt of the iceberg: Hidden security problems of ubiquitous systems
-
ed. A. A. Basten, M. Geilen and H. de Groot, Dordrecht, Kluwer
-
See R. BECKWITH: 'Designing for ubiquity: the perception of privacy', Pervasive Computing, 2003, 2, (2), 40-46 and F. STAJANO and J. CROWCROFT: The butt of the iceberg: hidden security problems of ubiquitous systems', in Ambient Intelligence: Impact on Embedded-System Design, (ed. A. A. Basten, M. Geilen and H. de Groot); 2003, Dordrecht, Kluwer.
-
(2003)
Ambient Intelligence: Impact on Embedded-system Design
-
-
Stajano, F.1
Crowcroft, J.2
-
4
-
-
0008942383
-
-
New York, NY, Wiley
-
For further detail on this see R. ANDERSON: Security Engineering; 2001, New York, NY, Wiley; the annual proceedings of the IEEE Computer Society Symposium on Security and Privacy; A. SERJEANTOV, R. DINGLEDINE and P. F. SYVERSON (ed.): Information Hiding; 2003, Berlin, Springer; and K. SPÄRCK JONES: 'Computer security - a layperson's guide, from the bottom up', Technical Report 550, Computer Laboratory, University of Cambridge, UK, 2002.
-
(2001)
Security Engineering
-
-
Anderson, R.1
-
5
-
-
84876652783
-
Annual proceedings of the IEEE Computer Society Symposium on Security and Privacy
-
Berlin, Springer
-
For further detail on this see R. ANDERSON: Security Engineering; 2001, New York, NY, Wiley; the annual proceedings of the IEEE Computer Society Symposium on Security and Privacy; A. SERJEANTOV, R. DINGLEDINE and P. F. SYVERSON (ed.): Information Hiding; 2003, Berlin, Springer; and K. SPÄRCK JONES: 'Computer security - a layperson's guide, from the bottom up', Technical Report 550, Computer Laboratory, University of Cambridge, UK, 2002.
-
(2003)
Information Hiding
-
-
Serjeantov, A.1
Dingledine, R.2
Syverson, P.F.3
-
6
-
-
84876623174
-
Computer security - A layperson's guide, from the bottom up
-
Computer Laboratory, University of Cambridge, UK
-
For further detail on this see R. ANDERSON: Security Engineering; 2001, New York, NY, Wiley; the annual proceedings of the IEEE Computer Society Symposium on Security and Privacy; A. SERJEANTOV, R. DINGLEDINE and P. F. SYVERSON (ed.): Information Hiding; 2003, Berlin, Springer; and K. SPÄRCK JONES: 'Computer security - a layperson's guide, from the bottom up', Technical Report 550, Computer Laboratory, University of Cambridge, UK, 2002.
-
(2002)
Technical Report
, vol.550
-
-
Spärck Jones, K.1
-
7
-
-
84876645934
-
-
note
-
Transcription technology is far from perfect, but quite good enough in general to locate the right bit of sound to listen to.
-
-
-
|