-
1
-
-
30344440798
-
Prototypes and paratypes: Designing mobile and ubiquitous computing applications
-
G. D. Abowd, G. R. Hayes, G. Iachello, J. A. Kientz, S. N. Patel, M. M. Stevens, and K. N. Truong. Prototypes and paratypes: Designing mobile and ubiquitous computing applications. In PerCom, 2005.
-
(2005)
PerCom
-
-
Abowd, G.D.1
Hayes, G.R.2
Iachello, G.3
Kientz, J.A.4
Patel, S.N.5
Stevens, M.M.6
Truong, K.N.7
-
3
-
-
59249099442
-
Flowers or a robot army?: Encouraging awareness & activity with personal, mobile displays
-
S. Consolvo, P. Klasnja, D. W. McDonald, D. Avrahami, J. Froehlich, L. LeGrand, R. Libby, K. Mosher, and J. A. Landay. Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays. In Ubicomp, 2008.
-
(2008)
Ubicomp
-
-
Consolvo, S.1
Klasnja, P.2
McDonald, D.W.3
Avrahami, D.4
Froehlich, J.5
LeGrand, L.6
Libby, R.7
Mosher, K.8
Landay, J.A.9
-
4
-
-
35448936042
-
Smokescreen: Flexible privacy controls for presence-sharing
-
L. P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In MobiSys, 2007.
-
(2007)
MobiSys
-
-
Cox, L.P.1
Dalton, A.2
Marupadi, V.3
-
6
-
-
19944388571
-
Social serendipity: Mobilizing social software
-
N. Eagle and A. Pentland. Social serendipity: Mobilizing social software. IEEE Pervasive Computing, 4(2):28-34, 2005.
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 28-34
-
-
Eagle, N.1
Pentland, A.2
-
8
-
-
67650661159
-
Improving wireless privacy with an identifier-free link layer protocol
-
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In MobiSys, 2008.
-
(2008)
MobiSys
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
9
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.
-
(2003)
MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
10
-
-
74049149229
-
Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis. ACM MONET, 2005.
-
(2005)
ACM MONET
-
-
Gruteser, M.1
Grunwald, D.2
-
13
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Mobicom, 2009.
-
(2009)
Mobicom
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
14
-
-
35449007284
-
Preserving location privacy in wireless lans
-
June
-
T. Jiang, H. J. Wang, and Y.-C. Hu. Preserving location privacy in wireless lans. In MobiSys, June 2007.
-
(2007)
MobiSys
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.-C.3
-
15
-
-
74049160193
-
-
John Leyden. Teen hack suspects charged over myspace extortion bid, May 2006. The Register.
-
John Leyden. Teen hack suspects charged over myspace extortion bid, May 2006. The Register.
-
-
-
-
17
-
-
85094322146
-
Information slicing: Anonymity using unreliable overlays
-
April
-
S. Katti, J. Cohen, and D. Katabi. Information slicing: Anonymity using unreliable overlays. In NSDI, April 2007.
-
(2007)
NSDI
-
-
Katti, S.1
Cohen, J.2
Katabi, D.3
-
18
-
-
59249084348
-
Location-based trust for mobile user-generated content: Applications, challenges and implementations
-
February
-
V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based trust for mobile user-generated content: applications, challenges and implementations. In HotMobile, February 2008.
-
(2008)
HotMobile
-
-
Lenders, V.1
Koukoumidis, E.2
Zhang, P.3
Martonosi, M.4
-
19
-
-
70450239642
-
Spate: Small-group pki-less authenticated trust establishment
-
Y.-H. Lin, A. Studer, H.-C. Hsiao, J. M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang. Spate: Small-group pki-less authenticated trust establishment. In MobiSys, 2009.
-
(2009)
MobiSys
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.M.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
20
-
-
74049106426
-
-
Loopt, Inc. Your social compass | loopt. http://www.loopt.com.
-
Loopt, Inc. Your social compass | loopt. http://www.loopt.com.
-
-
-
-
21
-
-
74049094177
-
Story and Brad Stone. Facebook retreats on online tracking
-
November
-
Louise Story and Brad Stone. Facebook retreats on online tracking, November 2007. The New York Times.
-
(2007)
The New York Times
-
-
Louise1
-
22
-
-
67650652709
-
We saw each other on the subway: Secure, anonymous proximity-based missed connections
-
J. Manweiler, R. Scudellari, Z. Cancio, and L. P. Cox. We saw each other on the subway: secure, anonymous proximity-based missed connections. In HotMobile, 2009.
-
(2009)
HotMobile
-
-
Manweiler, J.1
Scudellari, R.2
Cancio, Z.3
Cox, L.P.4
-
24
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Mobicom, 2008.
-
(2008)
Mobicom
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
25
-
-
74049120600
-
-
employees break into your profile, November
-
Megan McCarthy. How Facebook employees break into your profile, November 2007. http://www.valleywag.com.
-
(2007)
How Facebook
-
-
McCarthy, M.1
-
27
-
-
74049127756
-
-
U. Moller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster protocol, version 2. IETF Internet Draft, 2003
-
U. Moller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster protocol - version 2. IETF Internet Draft, 2003.
-
-
-
-
29
-
-
79551689384
-
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
-
T. Ristenpart, G. Maganis, A. Krishnamurthy, and T. Kohno. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. In USENIX Security, 2008.
-
(2008)
USENIX Security
-
-
Ristenpart, T.1
Maganis, G.2
Krishnamurthy, A.3
Kohno, T.4
-
30
-
-
67650661394
-
Enabling new mobile applications with location proofs
-
S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In HotMobile, 2009.
-
(2009)
HotMobile
-
-
Saroiu, S.1
Wolman, A.2
|