-
1
-
-
79954448127
-
Participatory noise pollution monitoring using mobile phones
-
Maisonneuve, N., Stevens, M., Ochab, B.: Participatory noise pollution monitoring using mobile phones. Information Policy 15, 51-71 (2010)
-
(2010)
Information Policy
, vol.15
, pp. 51-71
-
-
Maisonneuve, N.1
Stevens, M.2
Ochab, B.3
-
2
-
-
70249084540
-
N-smarts: Networked suite of mobile atmospheric real-time sensors
-
Honicky, R., Brewer, E.A., Paulos, E., White, R.: N-smarts: networked suite of mobile atmospheric real-time sensors. In: Proceedings of the 2nd ACM SIGCOMM workshop on Networked systems for developing regions (NSDR 2008), pp. 25-30 (2008)
-
(2008)
Proceedings of the 2nd ACM SIGCOMM Workshop on Networked Systems for Developing Regions (NSDR 2008)
, pp. 25-30
-
-
Honicky, R.1
Brewer, E.A.2
Paulos, E.3
White, R.4
-
3
-
-
84866503356
-
Nericell: Rich monitoring of road and traffic conditions using mobile smartphones
-
Mohan, P., Padmanabhan, V.N., Ramjee, R.: Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys 2008), pp. 323-336 (2008)
-
(2008)
Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys 2008)
, pp. 323-336
-
-
Mohan, P.1
Padmanabhan, V.N.2
Ramjee, R.3
-
4
-
-
77955002648
-
PRISM: Platform for remote sensing using smartphones
-
Das, T., Mohan, P., Padmanabhan, V.N., Ramjee, R., Sharma, A.: PRISM: platform for remote sensing using smartphones. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, California, USA, pp. 63-76 (2010)
-
(2010)
Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, California, USA
, pp. 63-76
-
-
Das, T.1
Mohan, P.2
Padmanabhan, V.N.3
Ramjee, R.4
Sharma, A.5
-
5
-
-
79960764118
-
AnonySense: A system for anonymous opportunistic sensing
-
Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing (2010)
-
(2010)
Journal of Pervasive and Mobile Computing
-
-
Shin, M.1
Cornelius, C.2
Peebles, D.3
Kapadia, A.4
Kotz, D.5
Triandopoulos, N.6
-
7
-
-
77951557185
-
Fusing mobile, sensor, and social data to fully enable context-aware computing
-
Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S., Seada, K.: Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile 2010), Annapolis, Maryland, pp. 60-65 (2010)
-
(2010)
Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile 2010), Annapolis, Maryland
, pp. 60-65
-
-
Beach, A.1
Gartrell, M.2
Xing, X.3
Han, R.4
Lv, Q.5
Mishra, S.6
Seada, K.7
-
9
-
-
77749271080
-
Query privacy in wireless sensor networks
-
Carbunar, B., Yu, Y., Shi,W., Pearce, M., Vasudevan, V.: Query privacy in wireless sensor networks. ACM Transactions on Sensor Networks 6(2) (2010)
-
(2010)
ACM Transactions on Sensor Networks
, vol.6
, Issue.2
-
-
Carbunar, B.1
Yu, Y.2
Shi, W.3
Pearce, M.4
Vasudevan, V.5
-
10
-
-
70349658629
-
DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks
-
Zhang, R., Zhang, Y., Ren, K.: DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. In: Proceeding of the 28th Conference on Computer Communications, INFOCOM 2009 (2009)
-
Proceeding of the 28th Conference on Computer Communications, INFOCOM 2009 (2009)
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
11
-
-
70449116305
-
Privacy-preserving querying in sensor networks
-
De Cristofaro, E., Ding, X., Tsudik, G.: Privacy-preserving querying in sensor networks. In: Proceeding of the International Conference on Computer Communications and Networks, ICCCN 2009 (2009)
-
Proceeding of the International Conference on Computer Communications and Networks, ICCCN 2009 (2009)
-
-
De Cristofaro, E.1
Ding, X.2
Tsudik, G.3
-
14
-
-
0020915882
-
Blind signatures for untraceable payments
-
Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199-203 (1982)
-
(1982)
CRYPTO
, pp. 199-203
-
-
Chaum, D.1
-
15
-
-
84955599449
-
How to Date Blind Signatures
-
Kim, K.-C., Matsumoto, T. (eds.) ASIACRYPT 1996. Springer, Heidelberg
-
Abe, M., Fujisaki, E.: How to Date Blind Signatures. In: Kim, K.-C., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 244-251. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1163
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
17
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
18
-
-
84875762817
-
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
19
-
-
84867248592
-
Untraceable Off-Line Cash in Wallets with Observers
-
(Extended Abstract). Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Brands, S.: Untraceable Off-Line Cash in Wallets with Observers (Extended Abstract). In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302-318. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 302-318
-
-
Brands, S.1
-
20
-
-
34848855786
-
Combating double-spending using cooperative P2P systems
-
Osipkov, I., Vasserman, E.Y., Hopper, N., Kim, Y.: Combating double-spending using cooperative P2P systems. In: Proceedings of the 27th International Conference on Distributed Computing Systems, ICDCS 2007 (2007)
-
Proceedings of the 27th International Conference on Distributed Computing Systems, ICDCS 2007 (2007)
-
-
Osipkov, I.1
Vasserman, E.Y.2
Hopper, N.3
Kim, Y.4
-
21
-
-
84947906522
-
The Exact Security of Digital Signatures - How to Sign with RSA and Rabin
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399-416. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
22
-
-
84921068281
-
On the Exact Security of Full Domain Hash
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
|