-
1
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
J. A. Muhtadi, R. H. Campbell, A. Kapadia, M. D. Mickunas, and S. Yi, "Routing through the mist: privacy preserving communication in ubiquitous computing environments," In Proc. ICDCS 2002, pp. 74-83, 2002.
-
(2002)
Proc. ICDCS 2002
, pp. 74-83
-
-
Muhtadi, J.A.1
Campbell, R.H.2
Kapadia, A.3
Mickunas, M.D.4
Yi, S.5
-
2
-
-
0029229217
-
An indoor wireless system for personalized shopping assistance
-
A. Asthana, M. Cravatts, and P. Krzyzanowski, "An indoor wireless system for personalized shopping assistance," In Proc. IEEE Workshop on Mobile Computing Systems and Applications, pp. 69-74, 1994.
-
(1994)
Proc. IEEE Workshop on Mobile Computing Systems and Applications
, pp. 69-74
-
-
Asthana, A.1
Cravatts, M.2
Krzyzanowski, P.3
-
3
-
-
0029235432
-
Teleporting - Making applications mobile
-
F. Bennett, T. Richardson, and A. Harter, "Teleporting - making applications mobile", In Proc. IEEE Workshop on Mobile Computing Systems and Applications 1994, pp. 82-84, 1994.
-
(1994)
Proc. IEEE Workshop on Mobile Computing Systems and Applications 1994
, pp. 82-84
-
-
Bennett, F.1
Richardson, T.2
Harter, A.3
-
4
-
-
2942524994
-
Location privacy in pervasive computing
-
Ed 1
-
A. R. Beresford, and F. Stajano, "Location privacy in pervasive computing," In IEEE Pervasive Comp., Vol 2, Ed 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Comp.
, vol.2
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
5
-
-
46449098913
-
User-controllable security and privacy for pervasive computing
-
J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh, "User-controllable security and privacy for pervasive computing," In Proc. HotMobile '07, 2007.
-
Proc. HotMobile '07, 2007
-
-
Cornwell, J.1
Fette, I.2
Hsieh, G.3
Prabaker, M.4
Rao, J.5
Tang, K.6
Vaniea, K.7
Bauer, L.8
Cranor, L.9
Hong, J.10
McLaren, B.11
Reiter, M.12
Sadeh, N.13
-
6
-
-
24744468399
-
Protection of privacy in pervasive computing environments
-
H. S. Cheng, D. Zhang, and J. G. Tan, "Protection of privacy in pervasive computing environments," In Proc. ITCC 2005, pp. 242-247, 2005.
-
(2005)
Proc. ITCC 2005
, pp. 242-247
-
-
Cheng, H.S.1
Zhang, D.2
Tan, J.G.3
-
8
-
-
0033346164
-
The conference assistant: Combining context-awareness with wearable computing
-
A. K. Dey, M. Futakawa, D. Salber, , and G. D. Abowd, "The conference assistant: combining context-awareness with wearable computing," In Proc. ISWC 1999, pp. 21-28, 1999.
-
(1999)
Proc. ISWC 1999
, pp. 21-28
-
-
Dey, A.K.1
Futakawa, M.2
Salber, D.3
Abowd, G.D.4
-
9
-
-
0242308057
-
A semantic e-wallet to reconcile privacy and context awareness
-
F. Gandon, and N. M. Sadeh, "A semantic e-wallet to reconcile privacy and context awareness," In Proc. ISWC 2003, pp. 385-401, 2003.
-
(2003)
Proc. ISWC 2003
, pp. 385-401
-
-
Gandon, F.1
Sadeh, N.M.2
-
10
-
-
0037481692
-
Instant messaging in teen life
-
R.E. Grinter, and L. Palen, "Instant messaging in teen life," In Proc. CSCW 2002, pp. 21-30, 2002.
-
(2002)
Proc. CSCW 2002
, pp. 21-30
-
-
Grinter, R.E.1
Palen, L.2
-
11
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
USENIX Association
-
M. Gruteser, and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," In Proc. MobiSys 2003, USENIX Association, pp. 31-42, 2003.
-
(2003)
Proc. MobiSys 2003
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
12
-
-
0037568809
-
Introducing instant messaging and chat in the workplace
-
J.D. Herbsleb, D.L. Atkins, D.G. Boyer, M. Handel, and T.A. Finholt, "Introducing instant messaging and chat in the workplace," In Proc. CHI 2002, 2002.
-
(2002)
Proc. CHI 2002
-
-
Herbsleb, J.D.1
Atkins, D.L.2
Boyer, D.G.3
Handel, M.4
Finholt, T.A.5
-
13
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
J. Hong, and J. A. Landay, "An architecture for privacy-sensitive ubiquitous computing," In Proc. MobiSys 2004, pp. 177-189, 2004.
-
(2004)
Proc. MobiSys 2004
, pp. 177-189
-
-
Hong, J.1
Landay, J.A.2
-
14
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
J. Hong, S. Lederer, J. Landay, "Privacy risk models for designing privacy-sensitive ubiquitous computing systems," In Proc. DIS 2004, pp. 91-100, 2004.
-
(2004)
Proc. DIS 2004
, pp. 91-100
-
-
Hong, J.1
Lederer, S.2
Landay, J.3
-
15
-
-
38149035174
-
Field deployment of 'imbuddy': A study of privacy control and feedback mechanisms for contextual IM
-
G. Hsieh, K.P. Tang, W.Y. Low, and J.I. Hong, "Field deployment of 'imbuddy': a study of privacy control and feedback mechanisms for contextual IM," In Proc. UbiComp 2007, pp. 91-108, 2007.
-
(2007)
Proc. UbiComp 2007
, pp. 91-108
-
-
Hsieh, G.1
Tang, K.P.2
Low, W.Y.3
Hong, J.I.4
-
16
-
-
0038675352
-
The character, functions, and styles of instant messaging in the workplace
-
E. Isaacs, A. Walendowski, S. Whittaker, D.J. Schiano, and C. Kamm, "The character, functions, and styles of instant messaging in the workplace," In Proc. CSCW 2002, pp. 11-20, 2002.
-
(2002)
Proc. CSCW 2002
, pp. 11-20
-
-
Isaacs, E.1
Walendowski, A.2
Whittaker, S.3
Schiano, D.J.4
Kamm, C.5
-
17
-
-
2942731250
-
Emotion recognition system using short-term monitoring of physiological signals
-
Ed 3
-
K. H. Kim, S. W. Bang, and S. R. Kim, "Emotion recognition system using short-term monitoring of physiological signals," In Medical and Biological Engineering and Computing, Vol 42, Ed 3, pp. 419-427, 2004.
-
(2004)
Medical and Biological Engineering and Computing
, vol.42
, pp. 419-427
-
-
Kim, K.H.1
Bang, S.W.2
Kim, S.R.3
-
18
-
-
84869078915
-
Who wants to know what when? privacy preference determinants in ubiquitous computing
-
S. Lederer, J. Mankoff, and A. K. Dey, "Who wants to know what when? privacy preference determinants in ubiquitous computing," In Proc. CHI 2003, pp. 724-725, 2003.
-
(2003)
Proc. CHI 2003
, pp. 724-725
-
-
Lederer, S.1
Mankoff, J.2
Dey, A.K.3
-
19
-
-
84958977900
-
Location-aware information delivery with ComMotion
-
N. Marmasse, and C. Schmandt, "Location-aware information delivery with ComMotion," In Proc. HUC 2000, pp. 157-171, 2000.
-
(2000)
Proc. HUC 2000
, pp. 157-171
-
-
Marmasse, N.1
Schmandt, C.2
-
20
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M. F. Mokbel, C. Chow, and W. G. Aref, "The new casper: query processing for location services without compromising privacy," In Proc. of VLDB 2006, pp. 763-774, 2006.
-
(2006)
Proc. of VLDB 2006
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.2
Aref, W.G.3
-
21
-
-
18744416556
-
Introducing chat into business organizations: Toward an instant messaging maturity model
-
ACM Press
-
M. J. Muller, M. E. Raven, S. Kogan, D. R. Millen, and K. Carey, "Introducing chat into business organizations: toward an instant messaging maturity model," In Proc. SIGGROUP Conference on Supporting Group Work 2003, ACM Press, pp. 50-57, 2003.
-
(2003)
Proc. SIGGROUP Conference on Supporting Group Work 2003
, pp. 50-57
-
-
Muller, M.J.1
Raven, M.E.2
Kogan, S.3
Millen, D.R.4
Carey, K.5
-
22
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies, "Preserving privacy in environments with location-based applications," In IEEE Pervasive Comp. 2, pp. 56-64, 2003.
-
(2003)
IEEE Pervasive Comp.
, vol.2
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
23
-
-
49149086781
-
Protecting user anonymity in pervasive computing environments
-
L. Pareschi, D. Riboni, and C. Bettini, "Protecting user anonymity in pervasive computing environments," In Proc. PerCom 08, pp. 11-19, 2008.
-
(2008)
Proc. PerCom 08
, pp. 11-19
-
-
Pareschi, L.1
Riboni, D.2
Bettini, C.3
-
24
-
-
49149123423
-
Composition and generalization of context data for privacy preservation
-
L. Pareschi, D. Riboni, A. Agostini, and C. Bettini, "Composition and generalization of context data for privacy preservation," In Proc. Percom 2008, pp. 429-433, 2008.
-
(2008)
Proc. Percom 2008
, pp. 429-433
-
-
Pareschi, L.1
Riboni, D.2
Agostini, A.3
Bettini, C.4
-
25
-
-
54949148734
-
Challenges and lessons in developing middleware on smart phones
-
Ed 10
-
O. Riva, and J. Kangasharju, "Challenges and lessons in developing middleware on smart phones," In Computer Magazine, Vol 41, Ed 10, pp. 23-31, 2008.
-
(2008)
Computer Magazine
, vol.41
, pp. 23-31
-
-
Riva, O.1
Kangasharju, J.2
-
26
-
-
0032670348
-
The context toolkit: Aiding the development of context-enabled applications
-
D. Salber, A. K. Dey, and G. D. Abowd, "The context toolkit: aiding the development of context-enabled applications," In Proc. CHI 1999, pp. 434-441, 1999.
-
(1999)
Proc. CHI 1999
, pp. 434-441
-
-
Salber, D.1
Dey, A.K.2
Abowd, G.D.3
-
27
-
-
84957639491
-
Advanced interaction in context
-
Springer Verlag
-
A. Schmidt, and K. A. Aidoo, A. Takaluoma, and U. Tuomela, K. V. Laerhoven, and W. V. Velde, "Advanced interaction in context," In Proc. HUC, Springer Verlag, pp. 89-101, 1999.
-
(1999)
Proc. HUC
, pp. 89-101
-
-
Schmidt, A.1
Aidoo, K.A.2
Takaluoma, A.3
Tuomela, U.4
Laerhoven, K.V.5
Velde, W.V.6
-
28
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Ed 6
-
L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression," In Int. Journal Uncertain. Fuzz, Vol 10, Ed 6, pp. 571-588, 2002.
-
(2002)
Int. Journal Uncertain. Fuzz
, vol.10
, pp. 571-588
-
-
Sweeney, L.1
-
29
-
-
51949109614
-
FPCS: A formal approach for privacy-aware context-based services
-
N. Talukder, and S. I. Ahamed, "FPCS: a formal approach for privacy-aware context-based services," In Proc. COMPSAC 08, pp. 432-439, 2008.
-
(2008)
Proc. COMPSAC 08
, pp. 432-439
-
-
Talukder, N.1
Ahamed, S.I.2
-
31
-
-
84976653144
-
Some computer science problems in ubiquitious computing
-
Ed 7, 199
-
M. Weiser, "Some computer science problems in ubiquitious computing," In Comm. of the ACM, Vol 36, Ed 7, pp. 75-84, 199.
-
Comm. of the ACM
, vol.36
, pp. 75-84
-
-
Weiser, M.1
-
32
-
-
24944448005
-
Context obfuscation for privacy via ontological descriptions
-
Springer
-
R. Wishart, K. Henricksen, and J. Indulska, "Context obfuscation for privacy via ontological descriptions," In First Int. Workshop on Location and Context-Awareness (LoCA), Vol. 3479, Springer, pp. 276-288, 2005.
-
(2005)
First Int. Workshop on Location and Context-Awareness (LoCA)
, vol.3479
, pp. 276-288
-
-
Wishart, R.1
Henricksen, K.2
Indulska, J.3
-
33
-
-
33644587121
-
Preserving mobile customer privacy: An access control system for moving objects and customer profiles
-
M. Youssef, V. Atluri, and N. R. Adam, "Preserving mobile customer privacy: an access control system for moving objects and customer profiles," In proc. MDM 2005, pp. 67-76, 2005.
-
(2005)
Proc. MDM 2005
, pp. 67-76
-
-
Youssef, M.1
Atluri, V.2
Adam, N.R.3
-
35
-
-
78649259851
-
-
XMMP Protocol, http://xmpp.org/protocols/
-
-
-
|