-
1
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
J. Al-Muhtadi, R. Campbell, A. Kapadia, M. Dennis Mickunas, and S. Yi. Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In ICDCS'02 - 22nd IEEE International Conference, pages 74-83, 2002.
-
(2002)
ICDCS'02 - 22nd IEEE International Conference
, pp. 74-83
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Dennis Mickunas, M.4
Yi, S.5
-
5
-
-
77953603480
-
Privacy and identity management for everyone
-
J. Camenisch, a. shelat, D. Sommer, S. Fischer-Hübner, M. Hansen, H. Krasemann, G. Lacoste, R. Leenes, and J. Tseng. Privacy and identity management for everyone. In Proceedings of DIM '05, pages 20-27, 2005.
-
(2005)
Proceedings of DIM '05
, pp. 20-27
-
-
Camenisch, J.1
shelat, A.2
Sommer, D.3
Fischer-Hübner, S.4
Hansen, M.5
Krasemann, H.6
Lacoste, G.7
Leenes, R.8
Tseng, J.9
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-90, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
8
-
-
10044278069
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
E. S. Chung, J. I. Hong, J. Lin, M. K. Prabaker, J. A. Landay, and A. L. Liu. Development and evaluation of emerging design patterns for ubiquitous computing. In Proceedings of DIS '04, pages 233-242, 2004.
-
(2004)
Proceedings of DIS '04
, pp. 233-242
-
-
Chung, E.S.1
Hong, J.I.2
Lin, J.3
Prabaker, M.K.4
Landay, J.A.5
Liu, A.L.6
-
9
-
-
0010546933
-
Perceptual user interfaces: Things that see
-
J. L. Crowley, J. Coutaz, and F. Bérard. Perceptual user interfaces: things that see. Communications of the ACM, 43(3):54-64, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.3
, pp. 54-64
-
-
Crowley, J.L.1
Coutaz, J.2
Bérard, F.3
-
11
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Proceedings of PERVASIVE 2005, pages 152-170, 2005.
-
(2005)
Proceedings of PERVASIVE 2005
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
12
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
M. J. Freedman and R. Morris. Tarzan: a peer-to-peer anonymizing network layer. In Proceedings of ACM CCS '02, pages 193-206, 2002.
-
(2002)
Proceedings of ACM CCS '02
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
13
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys2003, pages 31-42, 2003.
-
(2003)
ACM MobiSys2003
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
14
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing. In ACM MobiSys '04, pages 177-189, 2004.
-
(2004)
ACM MobiSys '04
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
15
-
-
0030386375
-
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
-
S. E. Hudson and I. Smith. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proceedings of ACM CSCW '96, pages 248-257, 1996.
-
(1996)
Proceedings of ACM CSCW '96
, pp. 248-257
-
-
Hudson, S.E.1
Smith, I.2
-
16
-
-
33745725717
-
An anonymous communication technique using dummies for location-based services
-
H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In Proceedings of the IEEE ICPS'05, pages 88-97, 2005.
-
(2005)
Proceedings of the IEEE ICPS'05
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
17
-
-
35248863455
-
Towards meeting the privacy challenge: Adapting DRM
-
L. Korba and S. Kenny. Towards meeting the privacy challenge: Adapting DRM. In ACM CCS-9 Workshop, pages 118-136, 2003.
-
(2003)
ACM CCS-9 Workshop
, pp. 118-136
-
-
Korba, L.1
Kenny, S.2
-
18
-
-
34547140442
-
-
S. Lahlou and F. Jegou. European disappearing computer privacy design guidelines v 1.1. Technical Report EDC-2003, Ambient Agoras, 2004.
-
S. Lahlou and F. Jegou. European disappearing computer privacy design guidelines v 1.1. Technical Report EDC-PG 2003, Ambient Agoras, 2004.
-
-
-
-
19
-
-
0015672289
-
A note on the confinement problem
-
B.W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
20
-
-
84945556728
-
Privacy by design - principles of privacy-aware ubiquitous systems
-
M. Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In UbiComp2001, pages 273-291, 2001.
-
(2001)
UbiComp2001
, pp. 273-291
-
-
Langheinrich, M.1
-
21
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In UbiComp 2002, pages 237-245, 2002.
-
(2002)
UbiComp 2002
, pp. 237-245
-
-
Langheinrich, M.1
-
22
-
-
0142156637
-
The design of a context-aware home media space for balancing privacy and awareness
-
C. Neustaedter and S. Greenberg. The design of a context-aware home media space for balancing privacy and awareness. In UbiComp 2003, pages 297-314, 2003.
-
(2003)
UbiComp 2003
, pp. 297-314
-
-
Neustaedter, C.1
Greenberg, S.2
-
23
-
-
33748543201
-
Distributed usage control
-
A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Communications of the ACM, 49(9):39-44, 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
24
-
-
33751033073
-
Efficient context-aware service discovery in multi-protocol pervasive environments
-
IEEE Computer Society, May
-
P.-G. Raverdy, O. Riva, A. de La Chapelle, R. Chibout, and V. Issarny. Efficient context-aware service discovery in multi-protocol pervasive environments. In Proceedings of MDM'06, page 3. IEEE Computer Society, May 2006.
-
(2006)
Proceedings of MDM'06
, pp. 3
-
-
Raverdy, P.-G.1
Riva, O.2
de La Chapelle, A.3
Chibout, R.4
Issarny, V.5
-
27
-
-
84946833891
-
-
R. L. Rivest, A. S., and Y Tauman. How to leak a secret. In Proceedings of ASIACRYPT '01, pages 552-565, 2001.
-
R. L. Rivest, A. S., and Y Tauman. How to leak a secret. In Proceedings of ASIACRYPT '01, pages 552-565, 2001.
-
-
-
-
29
-
-
0032264597
-
Evaluating image filtering based techniques in media space applications
-
Q. A. Zhao and J. T. Stasko. Evaluating image filtering based techniques in media space applications. In Proceedings of ACM CSCW '98, pages 11-18, 1998.
-
(1998)
Proceedings of ACM CSCW '98
, pp. 11-18
-
-
Zhao, Q.A.1
Stasko, J.T.2
|