-
2
-
-
46249110289
-
Talking assistant: A smart digital identity for ubiquitous computing
-
Austrian Computer Society (OCG)
-
Aitenbichler, E., Kangasharju, J., & Mühlhäuser, M. (2004). Talking assistant: A smart digital identity for ubiquitous computing. Advances in pervasive Computing (pp. 279-284). Austrian Computer Society (OCG).
-
(2004)
Advances In Pervasive Computing
, pp. 279-284
-
-
Aitenbichler, E.1
Kangasharju, J.2
Mühlhäuser, M.3
-
3
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M., & Yi, S. (2002). Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedings of IEEE International Conference of Distributed Computing Systems (ICDCS) (pp. 65-74).
-
(2002)
Proceedings of IEEE International Conference of Distributed Computing Systems (ICDCS)
, pp. 65-74
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, M.4
Yi, S.5
-
5
-
-
26444478592
-
RFID traceability: A multilayer problem
-
In A. S. Patrick & M. Yung (Eds.), February 28 - March 3, 2005, Revised Papers, Springer
-
Avoine, G., & Oechslin, P. (2005). RFID traceability: A multilayer problem. In A. S. Patrick & M. Yung (Eds.), Financial cryptography and data security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers (Vol. 3570, pp. 125-140). Springer.
-
(2005)
Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, the Commonwealth of Dominica
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
6
-
-
21644435024
-
-
Retrieved October 17, 2007
-
Back, A. (1997). Hashcash. Retrieved October 17, 2007, http://www.cypherspace.org/~adam/hashcash/.
-
(1997)
Hashcash
-
-
Back, A.1
-
7
-
-
33748979867
-
Enhancing the security of corporate Wi-Fi networks using DAIR
-
New York
-
Bahl, P., Chandra, R., Padhye, J., Ravindranath, L., Singh, M., Wolman, A., Zill, B. (2006). Enhancing the security of corporate Wi-Fi networks using DAIR. In Proceedings of the MobiSys 2006: Proceedings of the 4th international conference on Mobile systems, applications and services (pp. 1-14). New York.
-
(2006)
Proceedings of the MobiSys 2006: Proceedings of the 4th International Conference On Mobile Systems, Applications and Services
, pp. 1-14
-
-
Bahl, P.1
Chandra, R.2
Padhye, J.3
Ravindranath, L.4
Singh, M.5
Wolman, A.6
Zill, B.7
-
8
-
-
33751044073
-
Talking to strangers: Authentication in adhoc wireless networks
-
(NDSS '02), San Diego, California
-
Balfanz, D., Smetters, D., Stewart, P., & Wong, H. (2002). Talking to strangers: Authentication in adhoc wireless networks. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California.
-
(2002)
Proceedings of the Symposium On Network and Distributed Systems Security
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
11
-
-
33748538996
-
Perspectives for cryptographic long-term security
-
Buchmann, J., May, A., & Vollmer, U. (2006). Perspectives for cryptographic long-term security. Comm. ACM, 49(9), 50-55.
-
(2006)
Comm. ACM
, vol.49
, Issue.9
, pp. 50-55
-
-
Buchmann, J.1
May, A.2
Vollmer, U.3
-
12
-
-
84898220714
-
-
June, (Tech. Rep. No. TR-CTIT-06-29). Retrieved October 17, 2007, from
-
Buhan, I. R., Doumen, J. M., Hartel, P. H., & Veldhuis, R. N. J. (2006, June). Feeling is believing: A location limited channel based on grip pattern biometrics and cryptanalysis (Tech. Rep. No. TR-CTIT-06-29). Retrieved October 17, 2007, from http://eprints.eemcs.utwente.nl/5694/.
-
(2006)
Feeling is Believing: A Location Limited Channel Based On Grip Pattern Biometrics and Cryptanalysis
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
14
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2), 84-88.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
18
-
-
84958957924
-
RIPEMD-160, A strengthened version of RIPEMD
-
Springer LNCS 1039
-
Dobbertin, H., Bosselaers, A., & Preneel, B. (1996). RIPEMD-160, A strengthened version of RIPEMD. In Proceedings of the Fast Software Encryption (pp. 71-82). Springer LNCS 1039.
-
(1996)
Proceedings of the Fast Software Encryption
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
24
-
-
0011000478
-
An introduction to threshold cryptography
-
Gemmell, P. S. (1997). An introduction to threshold cryptography. RSA Laboratories' CryptoBytes, 2(3), 7-12.
-
(1997)
RSA Laboratories' CryptoBytes
, vol.2
, Issue.3
, pp. 7-12
-
-
Gemmell, P.S.1
-
26
-
-
85056516300
-
Location privacy
-
In A. Boukerche (Ed.), Chapman & Hall/CRC
-
Görlach, A., Heinemann, A., Terpstra, W. W., & Mühlhäuser, M. (2005). Location privacy. In A. Boukerche (Ed.), Handbook of algorithms for wireless networking and mobile computing (pp. 393-411). Chapman & Hall/CRC.
-
(2005)
Handbook of Algorithms For Wireless Networking and Mobile Computing
, pp. 393-411
-
-
Görlach, A.1
Heinemann, A.2
Terpstra, W.W.3
Mühlhäuser, M.4
-
27
-
-
84898338875
-
The urge to converge
-
Greiner, L. (2006). The urge to converge. netWorker, 10(2), 26-30.
-
(2006)
NetWorker
, vol.10
, Issue.2
, pp. 26-30
-
-
Greiner, L.1
-
28
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
USENIX
-
Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys) (pp. 31-42). USENIX.
-
(2003)
Proceedings of the First International Conference On Mobile Systems, Applications, and Services (MobiSys)
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
30
-
-
68949166728
-
-
Financial Cryptography
-
Heydt-Benjamin, T. S., Bailey, D. V., Fu, K., Juels, A., & O'Hare, T. (2007). Vulnerabilities in firstgeneration RFID-enabled credit cards. Financial Cryptography.
-
(2007)
Vulnerabilities In Firstgeneration RFID-enabled Credit Cards
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'Hare, T.5
-
32
-
-
33847791073
-
Pervasive patient monitoring - Take two at bedtime
-
Husemann, D., & Nidd, M. (2005). Pervasive patient monitoring - Take two at bedtime. ERCIM News, 70-71.
-
(2005)
ERCIM News
, pp. 70-71
-
-
Husemann, D.1
Nidd, M.2
-
35
-
-
33847249519
-
Security and privacy issues in e-passports
-
September, Athens, Greece
-
Juels, A., Molnar, D., & Wagner, D. (2005, September). Security and privacy issues in e-passports. In Proceedings of the Conference on Security and Privacy for Emerging Areas in Communication Networks: SecureComm, Athens, Greece.
-
(2005)
Proceedings of the Conference On Security and Privacy For Emerging Areas In Communication Networks: SecureComm
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
36
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
October, In V. Atluri (Ed.), Washington, DC
-
Juels, A., Rivest, R., & Szydlo, M. (2003, October). The blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Atluri (Ed.), Conference on computer and communications security: ACM CCS (pp. 103-111). Washington, DC.
-
(2003)
Conference On Computer and Communications Security: ACM CCS
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
39
-
-
33646107714
-
RFID security
-
November-December
-
Knospe, H., & Pohl, H. (2004, November-December). RFID security. Information Security Technical Report, 9(4), 39-50.
-
(2004)
Information Security Technical Report
, vol.9
, Issue.4
, pp. 39-50
-
-
Knospe, H.1
Pohl, H.2
-
41
-
-
84945556728
-
Privacy by design - Principles of privacy-aware ubiquitous systems
-
In G. D. Abowd, B. Brumitt, & S. A. Shafer (Eds.), Springer
-
Langheinrich, M. (2001). Privacy by design - Principles of privacy-aware ubiquitous systems. In G. D. Abowd, B. Brumitt, & S. A. Shafer (Eds.), Ubicomp (Vol. 2201, p. 273-291). Springer.
-
(2001)
Ubicomp
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
42
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
In G. Borriello & L. E. Holmquist (Eds.), Springer
-
Langheinrich, M. (2002). A privacy awareness system for ubiquitous computing environments. In G. Borriello & L. E. Holmquist (Eds.), Ubicomp (Vol. 2498, pp. 237-245). Springer.
-
(2002)
Ubicomp
, vol.2498
, pp. 237-245
-
-
Langheinrich, M.1
-
43
-
-
44649144215
-
-
October, (Tech. Rep. No. 2006-052). Amherst, MA: University of Massachusetts Amherst
-
Levine, B. N., Shields, C., & Margolin, N. B. (2006, October). A survey of solutions to the sybil attack (Tech. Rep. No. 2006-052). Amherst, MA: University of Massachusetts Amherst.
-
(2006)
A Survey of Solutions to The Sybil Attack
-
-
Levine, B.N.1
Shields, C.2
Margolin, N.B.3
-
48
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2003). Analyzing the energy consumption of security protocols. In Proceedings of the ISPLED-03 (pp. 30-35).
-
(2003)
Proceedings of the ISPLED-03
, pp. 30-35
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
49
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2), 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
53
-
-
79952577166
-
Pre-authentication using infrared
-
Spahic, A., Kreutzer, M., Kähmer, M., & Chandratilleke, S. (2005). Pre-authentication using infrared. Privacy, Security and Trust within the Context of Pervasive Computing (Vol. 780, pp. 105-112).
-
(2005)
Privacy, Security and Trust Within the Context of Pervasive Computing
, vol.780
, pp. 105-112
-
-
Spahic, A.1
Kreutzer, M.2
Kähmer, M.3
Chandratilleke, S.4
-
55
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Cambridge, UK, April 19-21, 1999, Proceedings
-
Stajano, F., & Anderson, R. J. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings (p. 172-194).
-
(1999)
Proceedings of the Security Protocols, 7th International Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
58
-
-
84898318157
-
Digitale Reisepässe in Deutschland - Prozesse und Sicherheitsinfrastruktur
-
Straub, T., Hartl, M., & Ruppert, M. (2006). Digitale Reisepässe in Deutschland - Prozesse und Sicherheitsinfrastruktur. In Proc. Sicherheit 2006 (p. 233-243).
-
(2006)
Proc. Sicherheit 2006
, pp. 233-243
-
-
Straub, T.1
Hartl, M.2
Ruppert, M.3
-
59
-
-
2442680525
-
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
-
In L. M. Liebrock (Ed.), New York: ACM Press
-
Straub, T., & Heinemann, A. (2004). An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation. In L. M. Liebrock (Ed.), Applied computing 2004. Proceedings of the 2004 ACM Symposium on Applied Computing (pp. 766-773), New York: ACM Press.
-
(2004)
Applied Computing 2004. Proceedings of the 2004 ACM Symposium On Applied Computing
, pp. 766-773
-
-
Straub, T.1
Heinemann, A.2
-
61
-
-
35048876270
-
Security and privacy aspects of lowcost radio frequency identification systems
-
Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2003). Security and privacy aspects of lowcost radio frequency identification systems. In Proceedings of the Security in Pervasive Computing (p. 201-212).
-
(2003)
Proceedings of the Security In Pervasive Computing
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|