-
2
-
-
84870630391
-
-
specifications
-
Trusted Platform Module (TPM) specifications, http://www. trustedcomputinggroup.org/developers/trustedplatformmodule.
-
Trusted Platform Module (TPM)
-
-
-
4
-
-
84885397625
-
Security and trust for m2m communications
-
May
-
I. Cha, Y. Shah, A. Schmidt, A. Leicher and M. Meyerstein, "Security and Trust for M2M Communications", in Proceedings of the Wireless World Research Forum Meeting 22 (WWRF 22), May 2009.
-
(2009)
Proceedings of the Wireless World Research Forum Meeting 22 (WWRF 22)
-
-
Cha, I.1
Shah, Y.2
Schmidt, A.3
Leicher, A.4
Meyerstein, M.5
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
David L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, 24(2): 84-90, 1981.
-
Communications of the ACM
, vol.242
, Issue.84-90
, pp. 1981
-
-
Chaum, D.L.1
-
7
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. Goldschlag, M. Reed and P. Syverson, "Onion routing for anonymous and private internet connections", Communications of the ACM, 42(2): 39-41, 1999.
-
(1999)
Communications of the ACM
, vol.422
, Issue.39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
8
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
Jul
-
J. Al-Muhtadi, R. Campbell, A. Kapadia, M. D. Mickunas and S. Yi, "Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments", in Proceedings of IEEE International Conference of Distributed Computing Systems, pages 65-74, Jul. 2002.
-
(2002)
Proceedings of IEEE International Conference of Distributed Computing Systems
, pp. 65-74
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, M.D.4
Yi, S.5
-
10
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study"
-
N. R. Adam and J. C. Worthmann, "Security-control methods for statistical databases: a comparative study", ACM Computing Surveys, 21(4): 515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.214
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
11
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "K-anonymity: A model for protecting privacy", International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
12
-
-
50249086141
-
Differential privacy
-
C. Dwork, "Differential Privacy", In ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
13
-
-
84873531880
-
-
A Presence-based GEOPRIV Location Object Format Dec
-
IETF RFC 4119, "A Presence-based GEOPRIV Location Object Format", Dec. 200"5.
-
(2005)
IETF RFC 4119
-
-
-
18
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identication systems
-
March
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identication Systems", in the 1st International Conference on Security in Pervasive Computing (SPC), March 2003.
-
(2003)
1st International Conference on Security in Pervasive Computing (SPC)
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
19
-
-
38049010942
-
Information confinement, privacy, and security in rfid systems
-
Dec
-
R.D.Pietro and R. Molva, "Information confinement, privacy, and security in RFID systems", in proceedings of ESORICS, Pages 187-202, Dec. 2007.
-
(2007)
Proceedings of ESORICS
, pp. 187-202
-
-
Pietro, R.D.1
Molva, R.2
-
22
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
J. Hong, J. D. Ng, S. Lederer, and J. A. Landay, "Privacy risk models for designing privacy-sensitive ubiquitous computing systems", in Proceedings of the 5th conference on designing interactive systems: processes, practices, methods, and techniques, 2004.
-
(2004)
Proceedings of the 5th Conference On Designing Interactive Systems: Processes, Practices, Methods, And Techniques
-
-
Hong, J.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
25
-
-
84859790284
-
Moving 2 mishap: M2m's impact on privacy and safety"
-
Jan./Feb
-
D. A. Bailey, "Moving 2 Mishap: M2M's Impact on Privacy and safety", IEEE Computer and Reliability Societies, Jan./Feb. 2012.
-
(2012)
IEEE Computer and Reliability Societies
-
-
Bailey, D.A.1
-
26
-
-
84890455044
-
International telecommunication union
-
TU report, Nov
-
International Telecommunication Union, "The Internet of Things", ITU report, Nov. 200"5.
-
(2005)
The Internet of Things
-
-
-
32
-
-
74049088801
-
Anonysense: Privacy-aware people-centric sensing
-
C. Cornelius, "AnonySense: Privacy-Aware People-Centric Sensing", in ACM MobiSys, 2008.
-
(2008)
ACM MobiSys
-
-
Cornelius, C.1
-
33
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56-64, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.21
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
36
-
-
2442539759
-
A privacy awareness system for ubiquitous computing environment
-
Marc Langheinrich
-
Marc Langheinrich, "A privacy awareness system for ubiquitous computing environment", in Ubicomp, 2002.
-
(2002)
Ubicomp
-
-
-
37
-
-
39349100902
-
Protecting location privacy with dynamic mac address exchanging in wireless networks
-
Nov
-
M. Lei, X. Hong, and S. V. Vrbsky, "Protecting location privacy with dynamic MAC address exchanging in wireless networks," in Proceedings of IEEE Globecom, Nov. 2007.
-
(2007)
Proceedings of IEEE Globecom
-
-
Lei, M.1
Hong, X.2
Vrbsky, S.V.3
-
38
-
-
36349002968
-
Support of anonymity in vanets-putting pseudonymity into practice
-
Mar
-
E. Fonseca, A. Festag, R. Baldessari, and R. Aguiar, "Support of anonymity in VANETs-Putting pseudonymity into practice", in Proceedings Of IEEE WCNC, Mar. 2007.
-
(2007)
Proceedings Of IEEE WCNC
-
-
Fonseca, E.1
Festag, A.2
Baldessari, R.3
Aguiar, R.4
-
39
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
USENIX
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking", in MobiSys, pages 31-42, USENIX, 2003.
-
(2003)
MobiSys
, pp. 31-2
-
-
Gruteser, M.1
Grunwald, D.2
-
41
-
-
78149342292
-
Privately querying locationbased services with sybilquery
-
P. Shankar, V. Ganapathy, and L. Iftode, "Privately querying locationbased services with sybilquery", in Ubicomp, 2009.
-
(2009)
Ubicomp
-
-
Shankar, P.1
Ganapathy, V.2
Iftode, L.3
-
43
-
-
70450278755
-
Hiding stars with fireworks: Location privacy through camouflage
-
J. T. Meyerowitz and R. R. Choudhury, "Hiding stars with fireworks: Location privacy through camouflage", in MobiCom, 2009.
-
(2009)
MobiCom
-
-
Meyerowitz, J.T.1
Choudhury, R.R.2
|