-
2
-
-
84959045053
-
A conceptual model for privacy policies
-
Cambridge (MS), USA
-
A. Coen-Porisini, P. Colombo, S. Sicari, and A. Trombetta, "A conceptual model for privacy policies, " in Proc. of SEA 2007, Cambridge (MS), USA.
-
(2007)
Proc. of SEA
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
Trombetta, A.4
-
3
-
-
77954712612
-
Dealing with anonymity in wireless sensor networks
-
Sierre, Switzerland
-
A. Coen-Porisini, P. Colombo, and S. Sicari, "Dealing with anonymity in wireless sensor networks, " in In Proceedings of 25th annual ACM symposium on Applied Computing (ACM SAC), Sierre, Switzerland, 2010.
-
(2010)
Proceedings of 25th Annual ACM Symposium on Applied Computing (ACM SAC)
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
-
4
-
-
80755141545
-
Privacy aware systems: From models to patterns
-
editor Dr. H. Mouratidis
-
A. Coen-Porisini, P. Colombo, and S. Sicari, "Privacy aware systems: from models to patterns" in Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global, editor Dr. H. Mouratidis, 2010.
-
(2010)
Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
-
7
-
-
84862192368
-
-
Directive 95/46/EC of the European Parliament. Communities of 23 November 1995, No L. 281
-
Directive 95/46/EC of the European Parliament. Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31.
-
Official Journal of the European
, pp. 31
-
-
-
8
-
-
34548016110
-
Privacyaware role based access control
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, "Privacyaware role based access control, " in Proceedings of the 12th ACM symposium on Access control models and technologies, 2007.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
9
-
-
34548455373
-
Reliable bursty convergecast in wireless sensor networks
-
H. Zhanga, A. Arorab, Y. Choic, and M. Goudac, "Reliable bursty convergecast in wireless sensor networks, " Elsevier Computer Communications, vol. 30, no. 13, pp. 2560-2576, 2007.
-
(2007)
Elsevier Computer Communications
, vol.30
, Issue.13
, pp. 2560-2576
-
-
Zhanga, H.1
Arorab, A.2
Choic, Y.3
Goudac, M.4
-
11
-
-
85092924851
-
Privacy-aware location sensor networks
-
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, "Privacy-aware location sensor networks, " in In Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
-
(2003)
Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX)
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
12
-
-
0142103313
-
Security and privacy in sensor networks
-
March
-
H. Chan and A. Perrig, "Security and privacy in sensor networks, " IEEE Computer Magazine, pp. 103-105, March 2003.
-
(2003)
IEEE Computer Magazine
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
13
-
-
85043033114
-
Framework for security and privacy in automotive telematics
-
M. G. S. Duri, P. M. X. Liu, R. Perez, M. Singh, and J. Tang, "Framework for security and privacy in automotive telematics, " in In Proceedings of 2nd ACM International Worksphop on Mobile Commerce, 2000.
-
(2000)
Proceedings of 2nd ACM International Worksphop on Mobile Commerce
-
-
Duri, M.G.S.1
Liu, P.M.X.2
Perez, R.3
Singh, M.4
Tang, J.5
-
16
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks, " Wireless Networking, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networking
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
18
-
-
14844294769
-
Privacy and security in library rfid: Issues, practices, and architectures
-
D. Molnar and D. Wagner, "Privacy and security in library rfid: Issues, practices, and architectures, " in In Proceedings of ACM CCS, 2004.
-
(2004)
Proceedings of ACM CCS
-
-
Molnar, D.1
Wagner, D.2
-
20
-
-
4544301464
-
Random key assignment for secure wireless sensor networks
-
Fairfax-VA, USA
-
R. D. Pietro, A. Mei, and L. V. Mancini, "Random key assignment for secure wireless sensor networks, " in Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Fairfax-VA, USA, 2003.
-
(2003)
Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
-
-
Pietro, R.D.1
Mei, A.2
Mancini, L.V.3
-
21
-
-
70349251527
-
Collaborative authentication in unattended wsns
-
Zurich, Switzerland
-
R. D. Pietro, C. Soriente, A. Spognardi, and G. Tsudik, "Collaborative authentication in unattended wsns, " in Proceedings of 2nd ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, 2009.
-
(2009)
Proceedings of 2nd ACM Conference on Wireless Network Security (WiSec)
-
-
Pietro, R.D.1
Soriente, C.2
Spognardi, A.3
Tsudik, G.4
-
22
-
-
33144454801
-
Secure positioning in wireless networks
-
Feb
-
S. Capkun and J. Hubaux, "Secure positioning in wireless networks, " in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 221-232, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.2
|