-
2
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
D. Balfanz, G. Durfee, R. Grinter, D. Smetters, and P. Stewart. Network-in-a-Box: How to set up a secure wireless network in under a minute. In 13th USENIX Security Symposium, 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.3
Smetters, D.4
Stewart, P.5
-
3
-
-
84946837370
-
Key-privacy in public-key encryption
-
C. Boyd, editor, Springer-Verlag, Dec
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In C. Boyd, editor, Advances in Cryptology – ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 566–582. Springer-Verlag, Dec. 2001.
-
(2001)
Advances in Cryptology – ASIACRYPT 2001, Volume 2248 of Lecture Notes in Computer Science
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
4
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society Press
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pages 394–403. IEEE Computer Society Press, 1997.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
9
-
-
85024290278
-
Group signatures
-
D. W. Davies, editor
-
D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology – EUROCRYPT’91, volume 547 of Lecture Notes in Computer Science, pages 257–265, 1991.
-
(1991)
Advances in Cryptology – EUROCRYPT’91, Volume 547 of Lecture Notes in Computer Science
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
10
-
-
33751563367
-
Lost and found in legoland
-
J. Collins. Lost and Found in Legoland, RFID Journal, 2004. http://www.rfidjournal.com/article/articleview/921/1/1/.
-
(2004)
RFID Journal
-
-
Collins, J.1
-
11
-
-
46449098913
-
User-controllable security and privacy for pervsaive computing
-
J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh. User-controllable security and privacy for pervsaive computing. In 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2007), 2007.
-
(2007)
8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2007)
-
-
Cornwell, J.1
Fette, I.2
Hsieh, G.3
Prabaker, M.4
Rao, J.5
Tang, K.6
Vaniea, K.7
Bauer, L.8
Cranor, L.9
Hong, J.10
McLaren, B.11
Reiter, M.12
Sadeh, N.13
-
12
-
-
85077686538
-
Protecting user data in ubiquitous computing environments: Towards trustworthy environments
-
Y. Duan and J. Canny. Protecting user data in ubiquitous computing environments: Towards trustworthy environments. In Workshop on Privacy Enhancing Technology, 2004.
-
(2004)
Workshop on Privacy Enhancing Technology
-
-
Duan, Y.1
Canny, J.2
-
13
-
-
0028447023
-
Fast subsequence matching in time-series databases
-
C. Faloutsos, M. Ranganathan, and Y. Manolopoulos. Fast subsequence matching in time-series databases. ACM SIGMOD Record, 23(2):419–429, 1994.
-
(1994)
ACM SIGMOD Record
, vol.23
, Issue.2
, pp. 419-429
-
-
Faloutsos, C.1
Ranganathan, M.2
Manolopoulos, Y.3
-
16
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
Hingham, MA, USA, Kluwer Academic Publishers
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. In ACM Mobile Networks and Applications (MONET), volume 10, pages 315–325, Hingham, MA, USA, 2005. Kluwer Academic Publishers.
-
(2005)
ACM Mobile Networks and Applications (MONET)
, vol.10
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
17
-
-
85026232021
-
BlueTrack – imperceptible tracking of bluetooth devices
-
M. Haase and M. Handy. BlueTrack – Imperceptible tracking of bluetooth devices. In Ubicomp Poster Proceedings, 2004.
-
(2004)
Ubicomp Poster Proceedings
-
-
Haase, M.1
Handy, M.2
-
18
-
-
0003684449
-
-
Springer
-
T. Hastie, R. Tibshirani, J. Friedman, et al. The elements of statistical learning: data mining, inference, and prediction. Springer, 2001.
-
(2001)
The Elements of Statistical Learning: Data Mining, Inference, and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
20
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
J. I. Hong and J. A. Landay. Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Designing Interactive Systems (DIS2004), 2004.
-
(2004)
Designing Interactive Systems (DIS2004)
-
-
Hong, J.I.1
Landay, J.A.2
-
21
-
-
34247389249
-
A framework for location privacy in wireless networks
-
Y.-C. Hu and H. J. Wang. A framework for location privacy in wireless networks. In ACM SIGCOMM Asia Workshop, 2005.
-
(2005)
ACM SIGCOMM Asia Workshop
-
-
Hu, Y.-C.1
Wang, H.J.2
-
22
-
-
33750337486
-
Developing privacy guidelines for social location disclosure applications and services
-
G. Iachello, I. Smith, S. Consolvo, M. chen, and G. Abowd. Developing privacy guidelines for social location disclosure applications and services. In Symposium on Usable Privacy and Security, 2005.
-
(2005)
Symposium on Usable Privacy and Security
-
-
Iachello, G.1
Smith, I.2
Consolvo, S.3
Chen, M.4
Abowd, G.5
-
23
-
-
85077724329
-
-
iPod Connector Female SMD. http://www.sparkfun.com/commerce/product_info. php?products_id=8035.
-
-
-
-
24
-
-
85077691720
-
-
iPod Linux. http://ipodlinux.org/Dock_ Connector.
-
iPod Linux
-
-
-
25
-
-
3042824178
-
A framework for comparing perspectives on privacy and pervasive technologies
-
Number October-December
-
A. Jacobs and G. Abowd. A framework for comparing perspectives on privacy and pervasive technologies. In IEEE Pervasive Computing Magazine. Volume 2, Number 4, October-December, 2003.
-
(2003)
IEEE Pervasive Computing Magazine
, vol.2
, Issue.4
-
-
Jacobs, A.1
Abowd, G.2
-
29
-
-
24944591431
-
Place lab: Device positioning using radio beacons in the wild
-
A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, timothy Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place lab: Device positioning using radio beacons in the wild. In Third International Conference on Pervasive Computing, 2005.
-
(2005)
Third International Conference on Pervasive Computing
-
-
LaMarca, A.1
Chawathe, Y.2
Consolvo, S.3
Hightower, J.4
Smith, I.5
Scott, J.6
Sohn, T.7
Howard, J.8
Hughes, J.9
Potter, F.10
Tabert, J.11
Powledge, P.12
Borriello, G.13
Schilit, B.14
-
34
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. In IEEE Pervasive Computing, 2003.
-
(2003)
IEEE Pervasive Computing
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
37
-
-
35348907851
-
Instrumenting the city: Developing methods for observing and understanding the digital cityscape
-
E. O’Neill, V. Kostakos, T. Kindberg, A. F. gen. Schieck, A. Penn, D. S. Fraser, and T. Jones. Instrumenting the city: Developing methods for observing and understanding the digital cityscape. In Ubicomp, 2006.
-
(2006)
Ubicomp
-
-
O’Neill, E.1
Kostakos, V.2
Kindberg, T.3
gen. Schieck, A.F.4
Penn, A.5
Fraser, D.S.6
Jones, T.7
-
39
-
-
84862195723
-
-
Manuscript
-
M. Pels, J. Barhorst, M. Michels, R. Hobo, and J. Barendse. Tracking people using bluetooth: Implications of enabling bluetooth discoverable mode, 2005. Manuscript.
-
(2005)
Tracking People Using Bluetooth: Implications of Enabling Bluetooth Discoverable Mode
-
-
Pels, M.1
Barhorst, J.2
Michels, M.3
Hobo, R.4
Barendse, J.5
-
43
-
-
85077722041
-
-
WireShark. http://www.wireshark.org
-
WireShark. http://www.wireshark.org.
-
-
-
|