메뉴 건너뛰기




Volumn 42, Issue 5, 2004, Pages 130-136

The quest for personal control over mobile location privacy

Author keywords

[No Author keywords available]

Indexed keywords

BLIND SOURCE SEPARATION; CLIENT SERVER COMPUTER SYSTEMS; CRYPTOGRAPHY; DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; LOCAL AREA NETWORKS; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 2542616812     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2004.1299356     Document Type: Article
Times cited : (77)

References (15)
  • 1
    • 84976653144 scopus 로고
    • Some computer science issues in ubiquitous computing
    • July
    • M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Commun. ACM, July 1993.
    • (1993) Commun. ACM
    • Weiser, M.1
  • 2
    • 2542626137 scopus 로고    scopus 로고
    • Waveguard: Secure location service for wireless andrew
    • Q. He et al., "WaveGuard: secure location service for wireless andrew," Int'l. Conf. Wireless Commun., 2001.
    • Int'l. Conf. Wireless Commun., 2001
    • He, Q.1
  • 3
    • 0001604533 scopus 로고    scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, "Blind Signatures for Untraceable Payments," Proc. Crypto '82, 1982.
    • Proc. Crypto '82, 1982
    • Chaum, D.1
  • 4
    • 0003729341 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • IETF RFC 2104, Feb.
    • H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: keyed-hashing for Message Authentication," IETF RFC 2104, Feb. 1997.
    • (1997)
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 5
    • 0032178780 scopus 로고    scopus 로고
    • A network architecture for heterogeneous mobile computing
    • Oct.
    • E. Brewer et al., "A Network Architecture for Heterogeneous Mobile Computing," IEEE Pers. Commun., Oct. 1998, pp. 8-24.
    • (1998) IEEE Pers. Commun. , pp. 8-24
    • Brewer, E.1
  • 9
    • 0036041841 scopus 로고    scopus 로고
    • Proxy-based security protocols in networked mobile devices
    • M. Burnside et al., "Proxy-based Security Protocols in Networked Mobile Devices," Proc. ACM SAC, 2002.
    • Proc. ACM SAC, 2002
    • Burnside, M.1
  • 11
    • 0032074579 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • May
    • M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing," IEEE JSAC, vol. 16, no. 4, May 1998, pp. 482-494.
    • (1998) IEEE JSAC , vol.16 , Issue.4 , pp. 482-494
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.