메뉴 건너뛰기




Volumn , Issue , 2008, Pages 337-362

Security for ubiquitous computing

Author keywords

[No Author keywords available]

Indexed keywords


EID: 72949119878     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-832-1.ch015     Document Type: Chapter
Times cited : (4)

References (61)
  • 2
    • 46249110289 scopus 로고    scopus 로고
    • Talking assistant: A smart digital identity for ubiquitous computing
    • Austrian Computer Society (OCG)
    • Aitenbichler, E., Kangasharju, J., & Mühlhäuser, M. (2004). Talking assistant: A smart digital identity for ubiquitous computing. Advances in pervasive Computing (pp. 279-284). Austrian Computer Society (OCG).
    • (2004) Advances In Pervasive Computing , pp. 279-284
    • Aitenbichler, E.1    Kangasharju, J.2    Mühlhäuser, M.3
  • 6
    • 21644435024 scopus 로고    scopus 로고
    • Retrieved October 17, 2007
    • Back, A. (1997). Hashcash. Retrieved October 17, 2007, http://www.cypherspace.org/~adam/hashcash/.
    • (1997) Hashcash
    • Back, A.1
  • 11
    • 33748538996 scopus 로고    scopus 로고
    • Perspectives for cryptographic long-term security
    • Buchmann, J., May, A., & Vollmer, U. (2006). Perspectives for cryptographic long-term security. Comm. ACM, 49(9), 50-55.
    • (2006) Comm. ACM , vol.49 , Issue.9 , pp. 50-55
    • Buchmann, J.1    May, A.2    Vollmer, U.3
  • 14
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2), 84-88.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 24
    • 0011000478 scopus 로고    scopus 로고
    • An introduction to threshold cryptography
    • Gemmell, P. S. (1997). An introduction to threshold cryptography. RSA Laboratories' CryptoBytes, 2(3), 7-12.
    • (1997) RSA Laboratories' CryptoBytes , vol.2 , Issue.3 , pp. 7-12
    • Gemmell, P.S.1
  • 27
    • 84898338875 scopus 로고    scopus 로고
    • The urge to converge
    • Greiner, L. (2006). The urge to converge. netWorker, 10(2), 26-30.
    • (2006) NetWorker , vol.10 , Issue.2 , pp. 26-30
    • Greiner, L.1
  • 32
    • 33847791073 scopus 로고    scopus 로고
    • Pervasive patient monitoring - Take two at bedtime
    • Husemann, D., & Nidd, M. (2005). Pervasive patient monitoring - Take two at bedtime. ERCIM News, 70-71.
    • (2005) ERCIM News , pp. 70-71
    • Husemann, D.1    Nidd, M.2
  • 36
    • 18744409344 scopus 로고    scopus 로고
    • The blocker tag: Selective blocking of RFID tags for consumer privacy
    • October, In V. Atluri (Ed.), Washington, DC
    • Juels, A., Rivest, R., & Szydlo, M. (2003, October). The blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Atluri (Ed.), Conference on computer and communications security: ACM CCS (pp. 103-111). Washington, DC.
    • (2003) Conference On Computer and Communications Security: ACM CCS , pp. 103-111
    • Juels, A.1    Rivest, R.2    Szydlo, M.3
  • 41
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design - Principles of privacy-aware ubiquitous systems
    • In G. D. Abowd, B. Brumitt, & S. A. Shafer (Eds.), Springer
    • Langheinrich, M. (2001). Privacy by design - Principles of privacy-aware ubiquitous systems. In G. D. Abowd, B. Brumitt, & S. A. Shafer (Eds.), Ubicomp (Vol. 2201, p. 273-291). Springer.
    • (2001) Ubicomp , vol.2201 , pp. 273-291
    • Langheinrich, M.1
  • 42
    • 84937411601 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments
    • In G. Borriello & L. E. Holmquist (Eds.), Springer
    • Langheinrich, M. (2002). A privacy awareness system for ubiquitous computing environments. In G. Borriello & L. E. Holmquist (Eds.), Ubicomp (Vol. 2498, pp. 237-245). Springer.
    • (2002) Ubicomp , vol.2498 , pp. 237-245
    • Langheinrich, M.1
  • 49
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2), 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 55
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Cambridge, UK, April 19-21, 1999, Proceedings
    • Stajano, F., & Anderson, R. J. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings (p. 172-194).
    • (1999) Proceedings of the Security Protocols, 7th International Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.J.2
  • 58
    • 84898318157 scopus 로고    scopus 로고
    • Digitale Reisepässe in Deutschland - Prozesse und Sicherheitsinfrastruktur
    • Straub, T., Hartl, M., & Ruppert, M. (2006). Digitale Reisepässe in Deutschland - Prozesse und Sicherheitsinfrastruktur. In Proc. Sicherheit 2006 (p. 233-243).
    • (2006) Proc. Sicherheit 2006 , pp. 233-243
    • Straub, T.1    Hartl, M.2    Ruppert, M.3
  • 59
    • 2442680525 scopus 로고    scopus 로고
    • An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
    • In L. M. Liebrock (Ed.), New York: ACM Press
    • Straub, T., & Heinemann, A. (2004). An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation. In L. M. Liebrock (Ed.), Applied computing 2004. Proceedings of the 2004 ACM Symposium on Applied Computing (pp. 766-773), New York: ACM Press.
    • (2004) Applied Computing 2004. Proceedings of the 2004 ACM Symposium On Applied Computing , pp. 766-773
    • Straub, T.1    Heinemann, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.