-
2
-
-
0345565893
-
A Survey of Key Management for Secure Group Communication
-
S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
3
-
-
0003978251
-
-
Internet Draft, IETF
-
D. Wallner, E. Harder, and R. Agee, Key Management for Multicast: Issues and Architecture, Internet Draft, IETF, 1998.
-
(1998)
Key Management for Multicast: Issues and Architecture
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
5
-
-
58849137176
-
-
Functional Stage 2 Description of Location Services (LCS, 3GPP, TS 23.271 Version 6.8.0 2006-06, 2006
-
Functional Stage 2 Description of Location Services (LCS), 3GPP, TS 23.271 Version 6.8.0 (2006-06), 2006.
-
-
-
-
6
-
-
58849130693
-
-
IETF, Geopriv Working Group
-
IETF, Geopriv Working Group, http://www.ietf.org/html. charters/geopriv-charter.html, 2008.
-
(2008)
-
-
-
8
-
-
37349052663
-
-
M. Haque and S.I. Ahamed, An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment, Proc. 31st Ann. Int'l Computer Software and Applications Conf, pp. 49-56, 2007
-
M. Haque and S.I. Ahamed, "An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment," Proc. 31st Ann. Int'l Computer Software and Applications Conf., pp. 49-56, 2007.
-
-
-
-
9
-
-
40949108218
-
B-Trust: Bayesian Trust Framework for Pervasive Computing
-
May
-
D. Quercia, S. Hailes, and L. Capra, "B-Trust: Bayesian Trust Framework for Pervasive Computing," Proc. Fourth Int'l Conf. Trust Management, pp. 269-278, May 2006.
-
(2006)
Proc. Fourth Int'l Conf. Trust Management
, pp. 269-278
-
-
Quercia, D.1
Hailes, S.2
Capra, L.3
-
10
-
-
84937411601
-
A Privacy Awareness System for Ubiquitous Computing Environments
-
M. Langheinrich, "A Privacy Awareness System for Ubiquitous Computing Environments," Proc. Fourth Int'l Conf. Ubiquitous Computing, pp. 237-245, 2002.
-
(2002)
Proc. Fourth Int'l Conf. Ubiquitous Computing
, pp. 237-245
-
-
Langheinrich, M.1
-
11
-
-
2342502819
-
Preserving Privacy in Environments with Location-Based Applications
-
G. Myles, A. Friday, and N. Davies, "Preserving Privacy in Environments with Location-Based Applications," IEEE Pervasive Computing, vol. 2, no. 1, pp. 56-64, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
12
-
-
2342562393
-
Protecting Privacy in Continuous Location-Tracking Applications
-
Mar
-
M. Gruteser and X. Liu, "Protecting Privacy in Continuous Location-Tracking Applications," IEEE Security and Privacy, vol. 2, no. 2, pp. 28-34, Mar. 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
13
-
-
85018204196
-
Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking
-
May
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. First Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '03), pp. 31-42, May 2003.
-
(2003)
Proc. First Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '03)
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
14
-
-
2942524994
-
Location Privacy in Pervasive Computing
-
A.R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
15
-
-
2542616812
-
Quest for Personal Control over Mobile Location Privacy
-
Q. He, D. Wu, and P. Khosla, "Quest for Personal Control over Mobile Location Privacy," IEEE Comm. Magazine, vol. 42, no. 5, pp. 130-136, 2004.
-
(2004)
IEEE Comm. Magazine
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
16
-
-
0347380855
-
Wireless Location Privacy Protection
-
B. Schilit, J. Hong, and M. Gruteser, "Wireless Location Privacy Protection," Computer, vol. 36, no. 12, pp. 135-137, 2003.
-
(2003)
Computer
, vol.36
, Issue.12
, pp. 135-137
-
-
Schilit, B.1
Hong, J.2
Gruteser, M.3
-
17
-
-
74049100678
-
Understanding and Capturing Peoples Privacy Policies in a People Finder Application
-
M. Prabaker, J. Rao, I. Fette, P. Kelley, L. Cranor, J. Hong, and N. Sadeh, "Understanding and Capturing Peoples Privacy Policies in a People Finder Application," Proc. UbiComp Workshop Privacy, 2007.
-
(2007)
Proc. UbiComp Workshop Privacy
-
-
Prabaker, M.1
Rao, J.2
Fette, I.3
Kelley, P.4
Cranor, L.5
Hong, J.6
Sadeh, N.7
-
18
-
-
35448936042
-
Smokescreen: Flexible Privacy Controls for Presence-Sharing
-
L.P. Cox, A. Dalton, and V. Marupadi, "Smokescreen: Flexible Privacy Controls for Presence-Sharing," Proc. Fifth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys), 2007.
-
(2007)
Proc. Fifth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys)
-
-
Cox, L.P.1
Dalton, A.2
Marupadi, V.3
-
19
-
-
0004135561
-
-
Internet Draft, IETF
-
D. Balenson, D. McGrew, and A. Sherman, Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization, Internet Draft, IETF, 2000.
-
(2000)
Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
20
-
-
0034838199
-
ELK, A New Protocol for Efficient Large-Group Key Distribution
-
May
-
A. Perrig, D. Song, and J.D. Tygar, "ELK, A New Protocol for Efficient Large-Group Key Distribution," Proc. IEEE Symp. Security and Privacy, pp. 247-262, May 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
21
-
-
0345427593
-
Using AVL Trees for Fault Tolerant Group Key Management,
-
Technical Report 2000-1823, Cornell Univ
-
O. Rodeh, K. Birman, and D. Dolev, "Using AVL Trees for Fault Tolerant Group Key Management," Technical Report 2000-1823, Cornell Univ., 2000.
-
(2000)
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
22
-
-
0003396988
-
-
Internet Draft, IETF
-
M. Moyer, J. Rao, and P. Rohatgi, Maintaining Balanced Key Trees for Secure Multicast, Internet Draft, IETF, 1999.
-
(1999)
Maintaining Balanced Key Trees for Secure Multicast
-
-
Moyer, M.1
Rao, J.2
Rohatgi, P.3
-
23
-
-
33748375161
-
A Balanced Key Tree Approach for Dynamic Secure Group Communication
-
G. Hao, N.V. Vinodchandran, and B. Ramamurthy, "A Balanced Key Tree Approach for Dynamic Secure Group Communication," Proc. 14th Int'l Conf. Computer Comm. and Networks, pp. 345-350, 2005.
-
(2005)
Proc. 14th Int'l Conf. Computer Comm. and Networks
, pp. 345-350
-
-
Hao, G.1
Vinodchandran, N.V.2
Ramamurthy, B.3
-
24
-
-
0037968839
-
Performance Optimizations for Group Key Management Schemes
-
May
-
S. Zhu, S. Setia, and S. Jajodia, "Performance Optimizations for Group Key Management Schemes," Proc. 23rd Int'l Conf. Distributed Computing Systems, pp. 345-350, May 2003.
-
(2003)
Proc. 23rd Int'l Conf. Distributed Computing Systems
, pp. 345-350
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
25
-
-
58849123385
-
-
MySpace, http://en.wikipedia.org/wiki/Myspace, 2008.
-
MySpace, http://en.wikipedia.org/wiki/Myspace, 2008.
-
-
-
-
27
-
-
58849127037
-
-
Facebook.statictics.retrievedon2007-12-20,http://www.facebook.com/press/ info.php?statistics, 2008.
-
Facebook.statictics.retrievedon2007-12-20,http://www.facebook.com/press/ info.php?statistics, 2008.
-
-
-
-
28
-
-
33749016498
-
Information Revelation and Privacy in Online Social Network (The Facebook Case)
-
R. Gross and A. Acquisti, "Information Revelation and Privacy in Online Social Network (The Facebook Case)," Proc. ACM Workshop Privacy in the Electronic Soc., pp. 71-80, 2005.
-
(2005)
Proc. ACM Workshop Privacy in the Electronic Soc
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
-
29
-
-
58849090136
-
-
MMORPG, http://en.wikipedia.org/wiki/MMORPG, 2008.
-
MMORPG, http://en.wikipedia.org/wiki/MMORPG, 2008.
-
-
-
-
30
-
-
58849113163
-
-
Botfighters2, http://www.Botfighters2.com, 2008.
-
(2008)
Botfighters2
-
-
-
31
-
-
58849139724
-
-
CitiTag, http://cnm.open.ac.uk/projects/cititag/, 2008.
-
(2008)
CitiTag
-
-
-
33
-
-
33745862770
-
-
N. Ducheneaut1, N. Yee, E. Nickell, and R.J. Moore, Alone Together? Exploring the Social Dynamics of Massively Multi-player Online Games, Proc. Int'l Conf. Human-Computer Interaction, pp. 407-416, 2006.
-
N. Ducheneaut1, N. Yee, E. Nickell, and R.J. Moore, "Alone Together? Exploring the Social Dynamics of Massively Multi-player Online Games," Proc. Int'l Conf. Human-Computer Interaction, pp. 407-416, 2006.
-
-
-
-
37
-
-
0010837979
-
General Balanced Trees
-
A. Andersson, "General Balanced Trees," J. Algorithms, vol. 30, no. 1, pp. 1-28, 1999.
-
(1999)
J. Algorithms
, vol.30
, Issue.1
, pp. 1-28
-
-
Andersson, A.1
-
41
-
-
0242341057
-
Multicast Group Behavior in the Internet's Multicast Backbone (mbone)
-
K. Almeroth and M. Ammar, "Multicast Group Behavior in the Internet's Multicast Backbone (mbone)," IEEE Comm., vol. 35, no. 6, pp. 124-129, 1997.
-
(1997)
IEEE Comm
, vol.35
, Issue.6
, pp. 124-129
-
-
Almeroth, K.1
Ammar, M.2
-
42
-
-
0042700217
-
Optimal Estimation of Multicast Membership
-
S. Alouf, E. Altman, C. Barakat, and P. Nain, "Optimal Estimation of Multicast Membership," IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2165-2176, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.8
, pp. 2165-2176
-
-
Alouf, S.1
Altman, E.2
Barakat, C.3
Nain, P.4
-
43
-
-
58849123819
-
-
Open Service Access (OSA, Parlay X Web Services, 3GPP, TS 29.199 Version 7.0.0 2006-06, 2006
-
Open Service Access (OSA); Parlay X Web Services, 3GPP, TS 29.199 Version 7.0.0 (2006-06), 2006.
-
-
-
|