-
2
-
-
84959045053
-
A conceptual model for privacy policies
-
Cambridge (MS), USA
-
A. Coen-Porisini, P. Colombo, S. Sicari, A. Trombetta, A conceptual model for privacy policies, in: Proceedings of SEA 2007, Cambridge (MS), USA.
-
Proceedings of SEA 2007
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
Trombetta, A.4
-
3
-
-
77954712612
-
Dealing with anonymity in wireless sensor networks
-
Sierre, Switzerland
-
A.Coen-Porisini, P.Colombo, S. Sicari, Dealing with anonymity in wireless sensor networks, in: Proceedings of 25th Annual ACM Symposium on Applied Computing (ACM SAC), Sierre, Switzerland, 2010.
-
(2010)
Proceedings of 25th Annual ACM Symposium on Applied Computing (ACM SAC)
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
-
4
-
-
80755141545
-
Privacy aware systems: From models to patterns
-
H. Mouratidis (Ed.)
-
A. Coen-Porisini, P. Colombo, S. Sicari, Privacy aware systems: from models to patterns, in: H. Mouratidis (Ed.), Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global, 2010.
-
(2010)
Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
-
8
-
-
34548016110
-
Privacy-aware role based access control
-
Q. Ni, A. Trombetta, E. Bertino, J. Lobo, Privacy-aware role based access control, in: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
9
-
-
34548455373
-
Reliable bursty convergecast in wireless sensor networks
-
H. Zhanga, A. Arorab, Y. Choic, and M. Goudac Reliable bursty convergecast in wireless sensor networks Elsevier Computer Communications 30 13 2007 2560 2576
-
(2007)
Elsevier Computer Communications
, vol.30
, Issue.13
, pp. 2560-2576
-
-
Zhanga, H.1
Arorab, A.2
Choic, Y.3
Goudac, M.4
-
11
-
-
85092924851
-
Privacy-aware location sensor networks
-
M. Gruteser, G. Schelle, A. Jain, R. Han, D. Grunwald, Privacy-aware location sensor networks, in: Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
-
(2003)
Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX)
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
12
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan, and A. Perrig Security and privacy in sensor networks IEEE Computer Magazine 2003 103 105
-
(2003)
IEEE Computer Magazine
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
13
-
-
85043033114
-
Framework for security and privacy in automotive telematics
-
M.G.S. Duri, P.M.X. Liu, R. Perez, M. Singh, J. Tang, Framework for security and privacy in automotive telematics," in: Proceedings of 2nd ACM International Worksphop on Mobile Commerce, 2000.
-
(2000)
Proceedings of 2nd ACM International Worksphop on Mobile Commerce
-
-
Duri, M.G.S.1
Liu, P.M.X.2
Perez, R.3
Singh, M.4
Tang, J.5
-
14
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Computer Science Laboratory, SRI International
-
P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
-
(1998)
Technical Report SRI-CSL-98-04
-
-
Samarati, P.1
Sweeney, L.2
-
16
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler Spins: security protocols for sensor networks Wireless Networking 8 5 2002 521 534
-
(2002)
Wireless Networking
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
18
-
-
14844294769
-
Privacy and security in library rfid: Issues, practices, and architectures
-
D. Molnar, D. Wagner, Privacy and security in library rfid: issues, practices, and architectures, in: Proceedings of ACM CCS, 2004.
-
(2004)
Proceedings of ACM CCS
-
-
Molnar, D.1
Wagner, D.2
-
20
-
-
4544301464
-
Random key assignment for secure wireless sensor networks
-
Fairfax-VA, USA
-
R.D. Pietro, A. Mei, L.V. Mancini, Random key assignment for secure wireless sensor networks, in: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASNs), Fairfax-VA, USA, 2003.
-
(2003)
Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASNs)
-
-
Pietro, R.D.1
Mei, A.2
Mancini, L.V.3
-
21
-
-
70349251527
-
Collaborative authentication in unattended wsns
-
Zurich, Switzerland
-
R.D. Pietro, C. Soriente, A. Spognardi, G. Tsudik, Collaborative authentication in unattended wsns, in: Proceedings of 2nd ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, 2009.
-
(2009)
Proceedings of 2nd ACM Conference on Wireless Network Security (WiSec)
-
-
Pietro, R.D.1
Soriente, C.2
Spognardi, A.3
Tsudik, G.4
-
22
-
-
33144454801
-
Secure positioning in wireless networks
-
February 2006
-
S. Capkun, J. Hubaux, Secure positioning in wireless networks, in: IEEE Journal on Selected Areas in Communications, vol. 24(2), February 2006, pp. 221-232.
-
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.2
-
24
-
-
84862208455
-
Cross layer data assessment in wireless sensor networks
-
Rome, Italy, 24-26 February 2012
-
A. Coen-Porisini, S.Sicari, Cross layer data assessment in wireless sensor networks, in: Proceeding of Sensornets 2012, International Conference on Sensor Networks, Rome, Italy, 24-26 February 2012.
-
Proceeding of Sensornets 2012, International Conference on Sensor Networks
-
-
Coen-Porisini, A.1
Sicari, S.2
|