-
1
-
-
0001853125
-
The computer of the 21st century
-
Weiser M (1991) The computer of the 21st century. Sci Am 265(3):66-75
-
(1991)
Sci Am
, vol.265
, Issue.3
, pp. 66-75
-
-
Weiser, M.1
-
2
-
-
0042377377
-
The future of business services in the age of ubiquitous computing
-
Fano A, Gershman A (2002) The future of business services in the age of ubiquitous computing. Commun ACM 45(12):83-87
-
(2002)
Commun ACM
, vol.45
, Issue.12
, pp. 83-87
-
-
Fano, A.1
Gershman, A.2
-
3
-
-
84900515472
-
Privacy in pervasive environments: Next generation labeling protocols
-
Ackerman MS (2004) Privacy in pervasive environments: Next generation labeling protocols. Pers Ubi Comp 8(6):430-439
-
(2004)
Pers Ubi Comp
, vol.8
, Issue.6
, pp. 430-439
-
-
Ackerman, M.S.1
-
4
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday
-
Dourish P, Grinter E, Delgado de la Flor J, Joseph M (2004) Security in the wild: User strategies for managing security as an everyday. Practical problem. Pers Ubi Comp 8(6):391-401
-
(2004)
Practical Problem. Pers Ubi Comp
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, E.2
Delgado de la Flor, J.3
Joseph, M.4
-
5
-
-
33847673456
-
-
UBICOMP, Göteborg Sweden. Available at
-
English C, Nixon P, Terzis S, McGettrick A, Lowe H (2002) Dynamic trust models for ubiquitous computing environments, workshop on security in ubiquitous computing, UBICOMP, Göteborg Sweden. Available at http://www.teco.edu/~philip/ubicomp2002ws/organize/paddy.pdf
-
(2002)
Dynamic Trust Models for Ubiquitous Computing Environments, Workshop on Security in Ubiquitous Computing
-
-
English, C.1
Nixon, P.2
Terzis, S.3
McGettrick, A.4
Lowe, H.5
-
6
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
Cahill V, Gray E, Seigneur J-M, Jensen CD, Yong Chen Shand B, Dimmock N, Twigg A, Bacon J, English C, Wagealla W, Terzis S, Nixon P, Di Marzo Serugendo G, Bryce C, Carbone M, Krukow K, Nielson M (2003) Using trust for secure collaboration in uncertain environments. Pervasive Comput IEEE 2(3):52-61
-
(2003)
Pervasive Comput IEEE
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
Seigneur, J.-M.3
Jensen, C.D.4
Yong Chen Shand, B.5
Dimmock, N.6
Twigg, A.7
Bacon, J.8
English, C.9
Wagealla, W.10
Terzis, S.11
Nixon, P.12
Di Marzo Serugendo, G.13
Bryce, C.14
Carbone, M.15
Krukow, K.16
Nielson, M.17
-
8
-
-
0242706920
-
Building customer trust in mobile commerce
-
Siau K, Shen Z (2003) Building customer trust in mobile commerce. Commun ACM 46(4):91-94
-
(2003)
Commun ACM
, vol.46
, Issue.4
, pp. 91-94
-
-
Siau, K.1
Shen, Z.2
-
9
-
-
0036605085
-
Mobile commerce: Framework, applications and networking support
-
Varshney UL, Vette RL (2002) Mobile commerce: Framework, applications and networking support. Mobile Netw Appl Springer 7(3):185-198
-
(2002)
Mobile Netw Appl Springer
, vol.7
, Issue.3
, pp. 185-198
-
-
Varshney, U.L.1
Vette, R.L.2
-
10
-
-
9244223982
-
HCI research issues in electronic commerce
-
Nah F, Davis S (2002). HCI research issues in electronic commerce. J Electron Com Res 3(3):98-113
-
(2002)
J Electron Com Res
, vol.3
, Issue.3
, pp. 98-113
-
-
Nah, F.1
Davis, S.2
-
11
-
-
0002135118
-
Consumer trust in an Internet store: A cross-cultural validation
-
Jarvenpaa SL, Tractinsky N, Saarinen L, Vitale M (1999). Consumer trust in an Internet store: A cross-cultural validation. J Comput-Med Commun 5(2):44-71
-
(1999)
J Comput-Med Commun
, vol.5
, Issue.2
, pp. 44-71
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
Saarinen, L.3
Vitale, M.4
-
12
-
-
84867939023
-
Online Trust: A stakeholder perspective, concepts, implications, and future directions
-
iShankar V, Urban GL, Sultan F (2002) Online Trust: A stakeholder perspective, concepts, implications, and future directions. J Strategic Inf Syst 11:325-344
-
(2002)
J Strategic Inf Syst
, vol.11
, pp. 325-344
-
-
iShankar, V.1
Urban, G.L.2
Sultan, F.3
-
13
-
-
4243164379
-
Understanding mobile handheld device use and adoption
-
Sarker S, Wells JD (2003) Understanding mobile handheld device use and adoption. Commun ACM 46(12):35-40
-
(2003)
Commun ACM
, vol.46
, Issue.12
, pp. 35-40
-
-
Sarker, S.1
Wells, J.D.2
-
14
-
-
13444280631
-
A qualitative investigation on consumer trust in mobile commerce
-
Siau K, Sheng H, Nah F, Davis S (2004) A qualitative investigation on consumer trust in mobile commerce. Int J Electron Bus (IJEB) 2(5):283-300
-
(2004)
Int J Electron Bus (IJEB)
, vol.2
, Issue.5
, pp. 283-300
-
-
Siau, K.1
Sheng, H.2
Nah, F.3
Davis, S.4
-
16
-
-
33745907062
-
The trouble with login: On usability and computer security in ubiquitous computing
-
DOI 10.1007/s00779-005-0347-6
-
Bardram JE (2005) The trouble with login: On usability and computer security in ubiquitous computing. Pers Ubi Comp DOI 10.1007/ s00779-005-0347-6
-
(2005)
Pers Ubi Comp
-
-
Bardram, J.E.1
-
17
-
-
30944445216
-
A design methodology for user access control (UAC) middleware
-
Steele R, Gardner W, Rajugan R, Dillon TS (2005) A design methodology for user access control (UAC) middleware. In: Proceedings of the 2005 IEEE international conference on e-technology, e-commerce and e-service (EEE'05), pp 385-390
-
(2005)
Proceedings of the 2005 IEEE International Conference on E-technology, E-commerce and E-service (EEE'05)
, pp. 385-390
-
-
Steele, R.1
Gardner, W.2
Rajugan, R.3
Dillon, T.S.4
-
19
-
-
3042785155
-
Developing consumer friendly pervasive retail systems
-
Kouriuthanassis P, Roussos G (2003) Developing consumer friendly pervasive retail systems. IEEE Pervasive Comput 2(2):32-39
-
(2003)
IEEE Pervasive Comput
, vol.2
, Issue.2
, pp. 32-39
-
-
Kouriuthanassis, P.1
Roussos, G.2
-
20
-
-
19944389712
-
Consumer perceptions of privacy, security and trust in ubiquitous commerce
-
Moussouri T, Roussos G (2004) Consumer perceptions of privacy, security and trust in ubiquitous commerce. Pers Ubiq 8(6):416-429
-
(2004)
Pers Ubiq
, vol.8
, Issue.6
, pp. 416-429
-
-
Moussouri, T.1
Roussos, G.2
-
21
-
-
0035428355
-
Designing an E-grocery application for a palm computer: Usabilityand interface issues
-
Bellamy R, Swart C, Kellogg WA, Richards J, Brezin J (2001) Designing an E-grocery application for a palm computer: Usabilityand interface issues. Pers Commun IEEE 8(4):60-64
-
(2001)
Pers Commun IEEE
, vol.8
, Issue.4
, pp. 60-64
-
-
Bellamy, R.1
Swart, C.2
Kellogg, W.A.3
Richards, J.4
Brezin, J.5
-
22
-
-
0038035110
-
Mobile computing in the retail arena
-
In: Ft. Lauderdale, Florida, USA
-
Newcomb E, Pashley T, Stasko J (2003) Mobile computing in the retail arena. In: Conference on human factors in computing systems, Proceedings of the SIGCHI conference on human factors in computing systems. Ft. Lauderdale, Florida, USA, pp 337-344
-
(2003)
Conference on Human Factors in Computing Systems, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 337-344
-
-
Newcomb, E.1
Pashley, T.2
Stasko, J.3
-
23
-
-
33744954822
-
An architecture for unifying web services authentication and authorization
-
In: Amsterdam, The Netherlands
-
Steele R, Tao W (2005) An architecture for unifying web services authentication and authorization. In: 3rd International conference on service oriented computing. Amsterdam, The Netherlands, pp 582-587
-
(2005)
3rd International Conference on Service Oriented Computing
, pp. 582-587
-
-
Steele, R.1
Tao, W.2
-
25
-
-
26844541982
-
Securing admission control in ubiquitous computing environment
-
In: Lecture notes in Computer Science, Reunion Island, France, April 17-21
-
Yang JP, Rhee YH (2005) Securing admission control in ubiquitous computing environment. In: 4th International conference on networking, vol 3421. Lecture notes in Computer Science, Reunion Island, France, April 17-21, pp 972-979
-
(2005)
4th International Conference on Networking
, vol.3421
, pp. 972-979
-
-
Yang, J.P.1
Rhee, Y.H.2
|