메뉴 건너뛰기




Volumn , Issue , 2008, Pages 193-196

Access control by testing for shared knowledge

Author keywords

Access control; Photo sharing; Privacy

Indexed keywords

CONTROL RULES; ON-LINE CONTENTS; PHOTO SHARING; PRIVACY;

EID: 57649224026     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1357054.1357086     Document Type: Conference Paper
Times cited : (17)

References (5)
  • 2
    • 19944367736 scopus 로고    scopus 로고
    • Lederer, S., Jason Hong., Dey, A.K., and Landay, J. (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing. 8(6), 440-454.
    • Lederer, S., Jason Hong., Dey, A.K., and Landay, J. (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing. 8(6), 440-454.
  • 3
    • 3042844145 scopus 로고    scopus 로고
    • Photographic Authentication through Untrusted Terminals
    • Pering, T., Sundar, M., Light, J. and Want, R. (2003). Photographic Authentication through Untrusted Terminals. IEEE Pervasive Computing, 2(1), 30-36.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 30-36
    • Pering, T.1    Sundar, M.2    Light, J.3    Want, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.