메뉴 건너뛰기




Volumn 28, Issue 4, 2003, Pages 287-292

Privacy: What's different now?

Author keywords

[No Author keywords available]

Indexed keywords

RADIO FREQUENCY IDENTIFICATION (RFID); SOCIOLOGY;

EID: 0347603436     PISSN: 03080188     EISSN: None     Source Type: Journal    
DOI: 10.1179/030801803225008677     Document Type: Review
Times cited : (24)

References (8)
  • 2
    • 0346869574 scopus 로고    scopus 로고
    • Designing for ubiquity: The perception of privacy
    • See R. BECKWITH: 'Designing for ubiquity: the perception of privacy', Pervasive Computing, 2003, 2, (2), 40-46 and F. STAJANO and J. CROWCROFT: The butt of the iceberg: hidden security problems of ubiquitous systems', in Ambient Intelligence: Impact on Embedded-System Design, (ed. A. A. Basten, M. Geilen and H. de Groot); 2003, Dordrecht, Kluwer.
    • (2003) Pervasive Computing , vol.2 , Issue.2 , pp. 40-46
    • Beckwith, R.1
  • 3
    • 0346869574 scopus 로고    scopus 로고
    • The butt of the iceberg: Hidden security problems of ubiquitous systems
    • ed. A. A. Basten, M. Geilen and H. de Groot, Dordrecht, Kluwer
    • See R. BECKWITH: 'Designing for ubiquity: the perception of privacy', Pervasive Computing, 2003, 2, (2), 40-46 and F. STAJANO and J. CROWCROFT: The butt of the iceberg: hidden security problems of ubiquitous systems', in Ambient Intelligence: Impact on Embedded-System Design, (ed. A. A. Basten, M. Geilen and H. de Groot); 2003, Dordrecht, Kluwer.
    • (2003) Ambient Intelligence: Impact on Embedded-system Design
    • Stajano, F.1    Crowcroft, J.2
  • 4
    • 0008942383 scopus 로고    scopus 로고
    • New York, NY, Wiley
    • For further detail on this see R. ANDERSON: Security Engineering; 2001, New York, NY, Wiley; the annual proceedings of the IEEE Computer Society Symposium on Security and Privacy; A. SERJEANTOV, R. DINGLEDINE and P. F. SYVERSON (ed.): Information Hiding; 2003, Berlin, Springer; and K. SPÄRCK JONES: 'Computer security - a layperson's guide, from the bottom up', Technical Report 550, Computer Laboratory, University of Cambridge, UK, 2002.
    • (2001) Security Engineering
    • Anderson, R.1
  • 5
    • 84876652783 scopus 로고    scopus 로고
    • Annual proceedings of the IEEE Computer Society Symposium on Security and Privacy
    • Berlin, Springer
    • For further detail on this see R. ANDERSON: Security Engineering; 2001, New York, NY, Wiley; the annual proceedings of the IEEE Computer Society Symposium on Security and Privacy; A. SERJEANTOV, R. DINGLEDINE and P. F. SYVERSON (ed.): Information Hiding; 2003, Berlin, Springer; and K. SPÄRCK JONES: 'Computer security - a layperson's guide, from the bottom up', Technical Report 550, Computer Laboratory, University of Cambridge, UK, 2002.
    • (2003) Information Hiding
    • Serjeantov, A.1    Dingledine, R.2    Syverson, P.F.3
  • 6
    • 84876623174 scopus 로고    scopus 로고
    • Computer security - A layperson's guide, from the bottom up
    • Computer Laboratory, University of Cambridge, UK
    • For further detail on this see R. ANDERSON: Security Engineering; 2001, New York, NY, Wiley; the annual proceedings of the IEEE Computer Society Symposium on Security and Privacy; A. SERJEANTOV, R. DINGLEDINE and P. F. SYVERSON (ed.): Information Hiding; 2003, Berlin, Springer; and K. SPÄRCK JONES: 'Computer security - a layperson's guide, from the bottom up', Technical Report 550, Computer Laboratory, University of Cambridge, UK, 2002.
    • (2002) Technical Report , vol.550
    • Spärck Jones, K.1
  • 7
    • 84876645934 scopus 로고    scopus 로고
    • note
    • Transcription technology is far from perfect, but quite good enough in general to locate the right bit of sound to listen to.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.