-
3
-
-
33749665781
-
A Technical Overview of Digital Credentials
-
Credentica, Tech. Rep
-
S. Brands, "A Technical Overview of Digital Credentials," Credentica, Tech. Rep., 2002.
-
(2002)
-
-
Brands, S.1
-
6
-
-
45749143221
-
-
th IFIP WG 6.1 International Conference (DAIS 2008), ser. LNCS, R. Meier and S. Terzis, Eds., 5053. Springer, 2008, pp. 154-167.
-
th IFIP WG 6.1 International Conference (DAIS 2008), ser. LNCS, R. Meier and S. Terzis, Eds., vol. 5053. Springer, 2008, pp. 154-167.
-
-
-
-
7
-
-
34547379480
-
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication
-
Alexandria, Virginia, USA, 30 Oct, 3 Nov
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, "How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, USA, 30 Oct - 3 Nov 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006)
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
9
-
-
74049086962
-
-
Legion of the Bouncy Castle, Bouncy Castle Crypto APIs, http://www.bouncycastle.org/java.html, 2009.
-
Legion of the Bouncy Castle, "Bouncy Castle Crypto APIs," http://www.bouncycastle.org/java.html, 2009.
-
-
-
-
10
-
-
84937411601
-
A Privacy Awareness System for Ubiquitous Computing Environments
-
UbiComp '02: Proceedings of the 4th international conference on Ubiquitous Computing, Springer-Verlag
-
M. Langheinrich, "A Privacy Awareness System for Ubiquitous Computing Environments," in UbiComp '02: Proceedings of the 4th international conference on Ubiquitous Computing, ser. LNCS, vol. 2498. Springer-Verlag, 2002, pp. 237-245.
-
(2002)
ser. LNCS
, vol.2498
, pp. 237-245
-
-
Langheinrich, M.1
-
11
-
-
24644520728
-
Towards Security and Privacy for Pervasive Computing
-
Software Security, Theories and Systems
-
R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemane, and M. D. Mickunas, "Towards Security and Privacy for Pervasive Computing," in Software Security - Theories and Systems, ser. LNCS, vol. 2609, 2003, pp. 1-15.
-
(2003)
ser. LNCS
, vol.2609
, pp. 1-15
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mickunas, M.D.5
-
12
-
-
36649011182
-
A Privacy-Aware Service Discovery Middleware for Pervasive Environments
-
Trust Management
-
R. S. Cardoso, P.-G. Raverdy, and V. Issarny, "A Privacy-Aware Service Discovery Middleware for Pervasive Environments," in Trust Management, ser. IFIP International Federation for Information Processing, vol. 238, 2007, pp. 59-74.
-
(2007)
ser. IFIP International Federation for Information Processing
, vol.238
, pp. 59-74
-
-
Cardoso, R.S.1
Raverdy, P.-G.2
Issarny, V.3
-
13
-
-
34547662160
-
Middleware for Secure Home Access and Control
-
IEEE Computer Society
-
A. Marin, W. Mueller, R. Schaefer, F. Almenarez, D. Diaz, and M. Ziegler, "Middleware for Secure Home Access and Control," in PER-COMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE Computer Society, 2007, pp. 489-494.
-
(2007)
PER-COMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 489-494
-
-
Marin, A.1
Mueller, W.2
Schaefer, R.3
Almenarez, F.4
Diaz, D.5
Ziegler, M.6
-
14
-
-
34547176295
-
Architecting Pervasive Computing Systems for Privacy: A Survey
-
Washington, DC, USA: IEEE Computer Society
-
R. S. Cardoso and V. Issarny, "Architecting Pervasive Computing Systems for Privacy: A Survey," in WICSA '07: Proceedings of the Sixth Working IEEE/IFIP Conference on Software Architecture. Washington, DC, USA: IEEE Computer Society, 2007, p. 26.
-
(2007)
WICSA '07: Proceedings of the Sixth Working IEEE/IFIP Conference on Software Architecture
, pp. 26
-
-
Cardoso, R.S.1
Issarny, V.2
-
15
-
-
57149109843
-
-
a. P. Sousa, Jo Challenges and Architectural Approaches for Authenticating Mobile Users, in SAM '08: Proceedings of the 1st International Workshop on Software Architectures and Mobility. ACM, 2008, pp. 15-20.
-
a. P. Sousa, Jo "Challenges and Architectural Approaches for Authenticating Mobile Users," in SAM '08: Proceedings of the 1st International Workshop on Software Architectures and Mobility. ACM, 2008, pp. 15-20.
-
-
-
-
16
-
-
35048814020
-
Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow
-
Computational Science and Its Applications, ICCSA 2004, Springer
-
S. O. Hwang and K. S. Yoon, "Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow," in Computational Science and Its Applications - (ICCSA 2004 ), ser. LNCS, vol. 3044. Springer, 2004, pp. 46-54.
-
(2004)
ser. LNCS
, vol.3044
, pp. 46-54
-
-
Hwang, S.O.1
Yoon, K.S.2
-
17
-
-
33745888870
-
Survey on Location Privacy in Pervasive Computing
-
Privacy, Security and Trust within the Context of Pervasive Computing, Springer
-
A. Görlach, A. Heinemann, and W. W. Terpstra, "Survey on Location Privacy in Pervasive Computing," in Privacy, Security and Trust within the Context of Pervasive Computing, ser. The International Series in Engineering and Computer Science. Springer, 2004, pp. 23-34.
-
(2004)
ser. The International Series in Engineering and Computer Science
, pp. 23-34
-
-
Görlach, A.1
Heinemann, A.2
Terpstra, W.W.3
-
18
-
-
84938704593
-
Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques
-
IEEE Computer Society
-
A. J. Blazic, K. Dolinar, and J. Porekar, "Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques," in ICDS '07: Proceedings of the First International Conference on the Digital Society. IEEE Computer Society, 2007, p. 30.
-
(2007)
ICDS '07: Proceedings of the First International Conference on the Digital Society
, pp. 30
-
-
Blazic, A.J.1
Dolinar, K.2
Porekar, J.3
|