-
1
-
-
84892318968
-
-
Cited 14 July 2004
-
Antichips.com. http://www.antichips.com/is-the-threat-real.htm. Cited 14 July 2004.
-
-
-
-
4
-
-
84892226468
-
-
EU Dataprotection laws, Cited 1 June 2007
-
EU Dataprotection laws. 1995. EU Directive95. http://europa.eu.int/comm/ internal-market/privacy/index-en. htm. Cited 1 June 2007.
-
(1995)
EU Directive95
-
-
-
5
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
Garfinkel, S. L. and Ari Juels, R. P. 2005. RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy 3. 3:34-43.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Ari Juels, R.P.2
-
7
-
-
84892362434
-
-
Privacy Implications of Nanotechnology, 26 April 2004, Cited 28 June 2004
-
Gutierrez, E. 2004. Privacy Implications of Nanotechnology, 26 April 2004. EPIC. http://www.epic.org/privacy/nano. Cited 28 June 2004.
-
(2004)
EPIC
-
-
Gutierrez, E.1
-
10
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb
-
Juels, A. 2006. RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24. 2(Feb):381-394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
13
-
-
84892292143
-
Lend me your arms: The use and implications of humancentric RFID
-
University of Wollongong, Cited 1 June 2007
-
Masters, A. and K. Michael. 2006. Lend Me Your Arms: The Use and Implications of Humancentric RFID. Faculty of Informatics, University of Wollongong. http://ro.uow.edu.au/infopapers/391. Cited 1 June 2007.
-
(2006)
Faculty of Informatics
-
-
Masters, A.1
Michael, K.2
-
15
-
-
26444495547
-
Privacy and security in library RFID
-
Cited 1 June 2007
-
Molnar, Dx. and D. Wagner. 2004. Privacy and Security in Library RFID. Issues, Practices, and Architectures. www.cs.berkeley.edu/?dmolnar/library.pdf. Cited 1 June 2007.
-
(2004)
Issues, Practices, and Architectures
-
-
Molnar, Dx.1
Wagner, D.2
-
16
-
-
84892293938
-
Privacy-enhancing radio frequency identification tag: Implementation of the clipped tag
-
May 1-3
-
Moskowitz, P. A. et al. 2006. Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag. RFID Journal Live (May 1-3).
-
(2006)
RFID Journal Live
-
-
Moskowitz, P.A.1
-
17
-
-
1842538795
-
Privacy as contextual integrity
-
Nissenbaum, H. 2004. Privacy as Contextual Integrity. Washington Law Review 79:101-139.
-
(2004)
Washington Law Review
, vol.79
, pp. 101-139
-
-
Nissenbaum, H.1
-
18
-
-
0004048289
-
-
Cambridge, MA: Cambridge University Press
-
Rawls, J. 1971. A Theory of Justice. Cambridge, MA: Cambridge University Press.
-
(1971)
A Theory of Justice
-
-
Rawls, J.1
-
19
-
-
84892283710
-
Driving to the panopticon
-
ed. J. Reiman, Lanham, MD: Rowman and Littlefield Publishers
-
Reiman, J. 1997. Driving to the Panopticon. In Critical Moral Liberalism, ed. J. Reiman, Lanham, MD: Rowman and Littlefield Publishers, pp. 169-188.
-
(1997)
Critical Moral Liberalism
, pp. 169-188
-
-
Reiman, J.1
-
22
-
-
38149100813
-
RFID: A systematic analysis of privacy threats & A 7 point plan to address them
-
Spiekermann, S. and H. Ziekow. 2006. RFID: A Systematic Analysis of Privacy Threats & A 7 point Plan to Address them. Journal of Information System Security 1. 3:4-18.
-
(2006)
Journal of Information System Security
, vol.1
, Issue.3
, pp. 4-18
-
-
Spiekermann, S.1
Ziekow, H.2
-
23
-
-
84892279384
-
-
Cited 14 July 2007
-
Ubisense.net. http://www.ubisense.net. Cited 14 July 2007.
-
-
-
-
25
-
-
84892198179
-
Privacy
-
C. Mitcham, Detroit, MI: Macmillian Reference
-
Van den Hoven, J. 2005. Privacy. In Encyclopedia of Science, Technology, and Ethics, eds. C. Mitcham, Detroit, MI: Macmillian Reference.
-
(2005)
Encyclopedia of Science, Technology, and Ethics
-
-
Van Den Hoven, J.1
-
27
-
-
84892278938
-
-
Culture, Communication & Technology Program, Georgetown University, Spring, Cited 1 June 2007
-
Wanczyk, S. D. 2004. The Nano-threats to Privacy: Sci-fi or Sci-fact? Culture, Communication & Technology Program, Georgetown University. Vol. 3, Spring. http://gnovis.georgetown. edu/includes/ac.cfm?documentNum=31. Cited 1 June 2007.
-
(2004)
The Nano-threats to Privacy: Sci-fi Or Sci-fact?
, vol.3
-
-
Wanczyk, S.D.1
|