-
1
-
-
33847040187
-
-
Microsoft Research
-
Microsoft Research. Easy living. http://research.microsoft.com/ easyliving/
-
Easy living
-
-
-
4
-
-
33846314126
-
-
MIT project oxygen
-
MIT project oxygen, http://oxygen.lcs.mit.edu/
-
-
-
-
5
-
-
33846312620
-
-
National Institute of Standards and Technology NIST
-
National Institute of Standards and Technology (NIST), Pervasive Computing SmartSpace Laboratory. http://www.nist.gov/smartspace/
-
Pervasive Computing SmartSpace Laboratory
-
-
-
6
-
-
33846330334
-
-
Georgia Institute of Technology, home
-
Georgia Institute of Technology. The aware home, http://www.cc.gatech. edu/fce/ahri/
-
-
-
-
7
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
Vienna, Austria
-
Al-Muhtadi J, Campbell R, Kapadia A, Mickunas D, Yi S (2002) Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: International conference of distributed computing systems (ICDCS 2002), Vienna, Austria
-
(2002)
International conference of distributed computing systems (ICDCS
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, D.4
Yi, S.5
-
8
-
-
0010294632
-
Routing through the mist: Design and implementation
-
Technical report UIUCDCS-R-2002-2267, March
-
Al-Muhtadi J, Campbell R, Kapadia A, Mickunas D, Yi S (2002) Routing through the mist: design and implementation. Technical report UIUCDCS-R-2002-2267, March 2002
-
(2002)
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, D.4
Yi, S.5
-
9
-
-
84994338554
-
-
Vienna, Austria, pp
-
Al-Muhtadi J, Ranganathan A, Campbell R, Mickunas M (2002) A flexible, privacy-preserving authentication frame-work for ubiquitous computing environments, ICDCS Workshops 2002, Vienna, Austria, pp 771-776
-
(2002)
A flexible, privacy-preserving authentication frame-work for ubiquitous computing environments, ICDCS Workshops 2002
, pp. 771-776
-
-
Al-Muhtadi, J.1
Ranganathan, A.2
Campbell, R.3
Mickunas, M.4
-
10
-
-
33847011964
-
-
Fort Worth, TX, pp
-
Al-Muhtadi J, Ranganathan A, Campbell R, Mickunas M, (2003) Cerberus: a context-aware security scheme for smart spaces, PerCom, Fort Worth, TX, pp 489-496
-
(2003)
Cerberus: A context-aware security scheme for smart spaces, PerCom
, pp. 489-496
-
-
Al-Muhtadi, J.1
Ranganathan, A.2
Campbell, R.3
Mickunas, M.4
-
11
-
-
33846296763
-
Proxy-based security protocols in networked mobile devices
-
Madrid, Spain
-
Burnside M et al (2002) Proxy-based security protocols in networked mobile devices. In: ACM SAC 2002, Madrid, Spain
-
(2002)
ACM SAC
-
-
Burnside, M.1
-
12
-
-
84945135810
-
Efficient nontransferable anonymous multi-show credential system with optional anonymity revocation
-
Advances in cryptology, EUROCRYPT, Springer, Berlin Heidelberg New York, pp
-
Camenisch J, Lysyanskaya A (2001) Efficient nontransferable anonymous multi-show credential system with optional anonymity revocation. In: Advances in cryptology, EUROCRYPT. LNCS 2045, Springer, Berlin Heidelberg New York, pp 93-118
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
24644520728
-
-
ISSS, Tokyo, Japan, pp
-
Campbell R, Al-Muhtadi J, Naldurg P, Sampemane G, Mickunas M (2002) Towards security and privacy for pervasive computing. In: ISSS, Tokyo, Japan, pp 1-15
-
(2002)
Towards security and privacy for pervasive computing
, pp. 1-15
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mickunas, M.5
-
14
-
-
0001604533
-
Blind signatures for untraceable payments
-
Chaum D, Rivest RL, Sherman AT eds, Plenum, New York, pp
-
Chaum D (1982) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in cryptology proceedings of crypto, vol 82. Plenum, New York, pp 199-203
-
(1982)
Advances in cryptology proceedings of crypto
, vol.82
, pp. 199-203
-
-
Chaum, D.1
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84-88
-
(1981)
Commun ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
16
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
Chaum D (1985) Security without identification: transaction systems to make Big Brother obsolete. Commun ACM 28(10):1030-1044
-
(1985)
Commun ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
17
-
-
35048858870
-
Authentication for pervasive computing
-
Security in pervasive computing 2003, Springer, Berlin Heidelberg New York, pp
-
Creese S et al (2004) Authentication for pervasive computing. In: Security in pervasive computing 2003. LNCS 2803, Springer, Berlin Heidelberg New York, pp 116-129
-
(2004)
LNCS
, vol.2803
, pp. 116-129
-
-
Creese, S.1
-
18
-
-
1642314732
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitiative analysis
-
San Diego, CA
-
Gruteser M, Grunwald D (2003) Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitiative analysis. In: WMASH03, San Diego, CA
-
(2003)
WMASH03
-
-
Gruteser, M.1
Grunwald, D.2
-
19
-
-
2542616812
-
The quest for personal control over mobile location privacy
-
He Q et al (2004) The quest for personal control over mobile location privacy. IEEE Commun Mag 42(5):130-136
-
(2004)
IEEE Commun Mag
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
-
21
-
-
35048847641
-
Tackling security and privacy issues in radio frequency identification devices
-
PERVASIVE, Springer, Berlin Heidelberg New York, pp
-
Henrici D, Muller, P (2004) Tackling security and privacy issues in radio frequency identification devices. In: PERVASIVE 2004, LNCS 3001. Springer, Berlin Heidelberg New York, pp 219-224
-
(2004)
LNCS
, vol.3001
, pp. 219-224
-
-
Henrici, D.1
Muller, P.2
-
22
-
-
46449120864
-
Pervasive privacy with identity management
-
Göteborg, Sweden
-
Jendricke U, Kreutzer M, Zugenmaier A (2002) Pervasive privacy with identity management. In: The 1st workshop on security, UbiComp 2002, Göteborg, Sweden
-
(2002)
The 1st workshop on security, UbiComp
-
-
Jendricke, U.1
Kreutzer, M.2
Zugenmaier, A.3
-
23
-
-
33846268586
-
Mobile identity management
-
Sep, Gõteborg, Sweden
-
Jendricke U, Kreutzer M, Zugenmaier A (2002) Mobile identity management. In: The 1st security workshop, UBICOMP, Sep. 2002, Gõteborg, Sweden
-
(2002)
The 1st security workshop, UBICOMP
-
-
Jendricke, U.1
Kreutzer, M.2
Zugenmaier, A.3
-
24
-
-
84937411601
-
-
Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: UbiComp 2002. LNCS 2498. Springer, Berlin Heidelberg New York, pp 237-245
-
Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: UbiComp 2002. LNCS 2498. Springer, Berlin Heidelberg New York, pp 237-245
-
-
-
-
25
-
-
67651053584
-
Pseudonym systems
-
Springer, Berlin Heidelberg New York, pp
-
Lysyanskaya A, Rivest R, Sahai A, Wolf S (1999) Pseudonym systems. In: Proceedings of selected areas in cryptography 1999. Springer, Berlin Heidelberg New York, pp 184-199
-
(1999)
Proceedings of selected areas in cryptography
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
27
-
-
33846331082
-
-
Park D (2001) Cryptographic protocols for third generation mobile communication systems. PhD thesis, Queensland University of Technology, Australia
-
Park D (2001) Cryptographic protocols for third generation mobile communication systems. PhD thesis, Queensland University of Technology, Australia
-
-
-
-
28
-
-
0017930809
-
A Method for obtaining digital signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L (1978) A Method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120-126
-
(1978)
Commun ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770-771
-
(1981)
Commun ACM
, vol.24
, Issue.11
, pp. 770-771
-
-
Lamport, L.1
-
32
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme in pervasive computing environments
-
July
-
Ren K, Lou W, Deng R, Kim K (2006) A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Trans Veh Technol 55(4):1373-1384, July
-
(2006)
IEEE Trans Veh Technol
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Deng, R.3
Kim, K.4
-
33
-
-
0001853125
-
The computer for the 21st century
-
Weiser M (1991) The computer for the 21st century. Sci Am 265(3)94-104
-
(1991)
Sci Am
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
35
-
-
33847038971
-
Anonymity for users of ubiquitous computing
-
Seattle, October 2003
-
Zugenmaier A, Hohl A (2003) Anonymity for users of ubiquitous computing. In: Security workshop, UbiComp 2003, Seattle, October 2003
-
(2003)
Security workshop, UbiComp
-
-
Zugenmaier, A.1
Hohl, A.2
|