-
1
-
-
84877727033
-
The Internet of Things-how the next evolution of the internet is changing everything
-
Evans D. The Internet of Things-how the next evolution of the internet is changing everything. CISCO White Paper 2011.
-
(2011)
CISCO White Paper
-
-
Evans, D.1
-
2
-
-
84871374016
-
Wireless visions: a look to the future by the fellows of the wwrf
-
David K, Jefferies N. Wireless visions: a look to the future by the fellows of the wwrf. IEEE Vehicular Technology Magazine 2012; 7(4): 26-36, doi:10.1109/MVT.2012.2218433.
-
(2012)
IEEE Vehicular Technology Magazine
, vol.7
, Issue.4
, pp. 26-36
-
-
David, K.1
Jefferies, N.2
-
3
-
-
78650501473
-
From the internet of computers to the internet of things
-
Sachs K, Petrov I, Guerrero P (eds). Springer-Verlag: Berlin, Heidelberg
-
Mattern F, Floerkemeier C. From the internet of computers to the internet of things. In From Active Data Management to Event-Based Systems and More, Sachs K, Petrov I, Guerrero P (eds). Springer-Verlag: Berlin, Heidelberg, 2010; 242-259.
-
(2010)
From Active Data Management to Event-Based Systems and More
, pp. 242-259
-
-
Mattern, F.1
Floerkemeier, C.2
-
4
-
-
84911869403
-
-
IOT-I: Internet of Things Initiative: public deliverables-D2.1: initial report on IoT applications of strategic interest
-
Presser M, Krco S. IOT-I: Internet of Things Initiative: public deliverables-D2.1: initial report on IoT applications of strategic interest, 2010.
-
(2010)
-
-
Presser, M.1
Krco, S.2
-
5
-
-
77956877124
-
The Internet of Things: a survey
-
Atzori L, Iera A, Morabito G. The Internet of Things: a survey. Computer Networks 2010; 54(15): 2787-2805, doi:10.1016/j.comnet.2010.05.010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
6
-
-
84860076265
-
Benetton to Tag 15 Million Items
-
(Accessed 2012-09-25).
-
Benetton to Tag 15 Million Items. RFID Journal, 2003. Available at: http://bit.ly/XXe4Wi (Accessed 2012-09-25).
-
(2003)
RFID Journal
-
-
-
7
-
-
84911874821
-
Boycott Benetton-no RFID tracking chips in clothing!
-
Press Release, (Accessed 2012-09-25).
-
Albrecht K. Boycott Benetton-no RFID tracking chips in clothing! Press Release, 2003. Available at: http://bit.ly/49yTca (Accessed 2012-09-25).
-
(2003)
-
-
Albrecht, K.1
-
8
-
-
84865333358
-
No to mandatory smart metering does not equal privacy!
-
Tilburg Institute for Law, Technology, and Society: Webblog
-
Cuijpers C. No to mandatory smart metering does not equal privacy! Tilburg Institute for Law, Technology, and Society: Webblog, 2009.
-
(2009)
-
-
Cuijpers, C.1
-
9
-
-
84911903592
-
-
INDECT project, (Accessed 2012-10-12).
-
The INDECT Consortium. INDECT project, 2009. Available at: http://www.indect-project.eu/ (Accessed 2012-10-12).
-
(2009)
-
-
-
10
-
-
84911928740
-
-
STOPP INDECT, (Accessed 2012-10-12).
-
Münch V. STOPP INDECT, 2012. Available at: http://www.stopp-indect.info (Accessed 2012-10-12).
-
(2012)
-
-
Münch, V.1
-
11
-
-
78149487947
-
Privacy: aspects, definitions and a multi-faceted privacy preservation approach
-
Information Security for South Africa (ISSA), 2010
-
Renaud K, Gáandlvez Cruz D. Privacy: aspects, definitions and a multi-faceted privacy preservation approach, Information Security for South Africa (ISSA), 2010, 2010; 1-8, doi:10.1109/ISSA.2010.5588297.
-
(2010)
, pp. 1-8
-
-
Renaud, K.1
Gáandlvez Cruz, D.2
-
13
-
-
84964614826
-
Towards a model for security and privacy in the internet of things
-
1st International Workshop on the Security of the Internet of Things, Tokyo, Japan
-
Radomirovic S. Towards a model for security and privacy in the internet of things, 1st International Workshop on the Security of the Internet of Things, Tokyo, Japan, 2010; 1-487.
-
(2010)
, pp. 1-487
-
-
Radomirovic, S.1
-
16
-
-
33646771783
-
-
The Internet of Things. ITU Internet Reports
-
International Telecommunication Union (ITU). The Internet of Things. ITU Internet Reports, 2005.
-
(2005)
-
-
-
18
-
-
84911896438
-
-
IOT-I: Internet of Things Initiative: Public Deliverables - D1.2 First Reference Model White Paper
-
Bauer M, Carrez F, Egan R, et al.IOT-I: Internet of Things Initiative: Public Deliverables - D1.2 First Reference Model White Paper, 2011.
-
(2011)
-
-
Bauer, M.1
Carrez, F.2
Egan, R.3
-
19
-
-
84911877027
-
-
IOT-A Consortium. Internet of Things architecture. (Accessed 2012-10-12).
-
IOT-A Consortium. Internet of Things architecture, 2011. Available at: http://bit.ly/124jw0M (Accessed 2012-10-12).
-
(2011)
-
-
-
20
-
-
84911875131
-
-
IP for smart objects. Ipso alliance white paper
-
Dunkels A, Vasseur J. IP for smart objects. Ipso alliance white paper, 2008.
-
(2008)
-
-
Dunkels, A.1
Vasseur, J.2
-
21
-
-
84911921744
-
-
Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data
-
Organisation for Economic Co-operation and Development (OECD). Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data, 1980.
-
(1980)
-
-
-
22
-
-
84911879378
-
-
Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
The European Parliament and the Council of the European Union. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 1995.
-
(1995)
-
-
-
23
-
-
84911912137
-
-
The U.S.-EU & U.S.-Swiss Safe Harbor Frameworks (Accessed 2012-10-12).
-
US Department of Commerce. The U.S.-EU & U.S.-Swiss Safe Harbor Frameworks, 2012. Available at: http://export.gov/safeharbor/ (Accessed 2012-10-12).
-
(2012)
-
-
-
24
-
-
84911898729
-
-
Chronology of Data Breaches 2005-present (Accessed: 2012-10-12).
-
Privacy Rights Clearinghouse. Chronology of Data Breaches 2005-present, 2012. Available at: http://bit.ly/bHHODz (Accessed: 2012-10-12).
-
(2012)
-
-
-
25
-
-
84883327107
-
-
3rded.: Halifax, UK
-
Internet of Things European Research Cluster (IERC). The Internet of Things 2012-New Horizons, 3rded.: Halifax, UK, 2012.
-
(2012)
The Internet of Things 2012-New Horizons
-
-
-
26
-
-
80052854156
-
Securing the Internet of Things
-
Roman R, Najera P, Lopez J. Securing the Internet of Things. Computer 2011; 44(9): 51-58, doi:10.1109/MC.2011.291.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
27
-
-
84911924682
-
-
Hewlett Packard - CENSE (Accessed 2013-01-31).
-
Hewlett Packard - CENSE, 2013. Available at: http://bit.ly/7N763 (Accessed 2013-01-31).
-
(2013)
-
-
-
28
-
-
84911886067
-
-
IBM-making markets: smarter planet, (Accessed 2013-01-31).
-
Jon Iwata. IBM-making markets: smarter planet, 2012. Available at: http://ibm.co/X8warV (Accessed 2013-01-31).
-
(2012)
-
-
Iwata, J.1
-
29
-
-
67349277665
-
Building the internet of things using RFID: the RFID ecosystem experience
-
Welbourne E, Battle L, Cole G, et al. Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Computing 2009; 13(3): 48-55.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.3
, pp. 48-55
-
-
Welbourne, E.1
Battle, L.2
Cole, G.3
-
30
-
-
84911903516
-
-
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012-2017. CISCO white paper
-
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012-2017. CISCO white paper, 2013.
-
(2013)
-
-
-
31
-
-
84911909178
-
Intel: xhips in brains will control computers by 2020
-
Computerworld (Accessed: 2013-01-31).
-
Gaudin S. Intel: xhips in brains will control computers by 2020. Computerworld, 2009. Available at: http://bit.ly/yYyoF (Accessed: 2013-01-31).
-
(2009)
-
-
Gaudin, S.1
-
33
-
-
83555176391
-
Security challenges in the IP-based internet of things
-
Heer T, Garcia-Morchon O, Hummen R, Keoh S, Kumar S, Wehrle K. Security challenges in the IP-based internet of things. Wireless Personal Communications 2011; 61: 527-542, doi:10.1007/s11277-011-0385-5.
-
(2011)
Wireless Personal Communications
, vol.61
, pp. 527-542
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.4
Kumar, S.5
Wehrle, K.6
-
35
-
-
84911862744
-
-
Google will pay $22.5 million to settle ftc charges it misrepresented privacy assurances to users of Apple's Safari Internet Browser, Available at: (Accessed 2012-10-12].
-
Federal Trade Commission. Google will pay $22.5 million to settle ftc charges it misrepresented privacy assurances to users of Apple's Safari Internet Browser, 2005. Available at: http://1.usa.gov/MkXMqe (Accessed 2012-10-12].
-
(2005)
-
-
-
36
-
-
0001853125
-
The computer for the 21st century
-
Weiser M. The computer for the 21st century. Scientific American 1991; 265(3): 94-104.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
38
-
-
84866034380
-
The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization
-
Atzori L, Iera A, Morabito G, Nitti M. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization. Computer Networks 2012; 56(16): 3594-3608.
-
(2012)
Computer Networks
, vol.56
, Issue.16
, pp. 3594-3608
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
Nitti, M.4
-
39
-
-
33144457479
-
RFID security and privacy: a research survey
-
Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 2006; 24(2): 381-394, doi:10.1109/JSAC.2005.861395.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
40
-
-
67650674080
-
A survey of RFID privacy approaches
-
Langheinrich M. A survey of RFID privacy approaches. Personal and Ubiquitous Computing 2009; 13(6): 413-421, doi:10.1007/s00779-008-0213-4.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 413-421
-
-
Langheinrich, M.1
-
41
-
-
79958007947
-
50 ways to break RFID privacy
-
IFIP Advances in Information and Communication Technology. Springer: Boston
-
van Deursen T. 50 ways to break RFID privacy. In Privacy and Identity Management for Life, vol.352, IFIP Advances in Information and Communication Technology. Springer: Boston, 2011; 192-205, doi:10.1007/978-3-642-20769-3 16.
-
(2011)
Privacy and Identity Management for Life
, vol.352
, pp. 192-205
-
-
van Deursen, T.1
-
42
-
-
84911932177
-
-
ZigBee Alliance. ZigBee specification
-
ZigBee Alliance. ZigBee specification, 2006.
-
(2006)
-
-
-
43
-
-
84911911575
-
-
Z-Wave Alliance. The Z-Wave Alliance (Accessed 2012-10-12).
-
Z-Wave Alliance. The Z-Wave Alliance, 2012. Available at: http://www.z-wavealliance.org/ (Accessed 2012-10-12).
-
(2012)
-
-
-
44
-
-
84911948087
-
-
(Accessed 2012-10-12).
-
ANT wireless-Dynastream Innovations Inc. Availabe at: http://www.thisisant.com/ (Accessed 2012-10-12).
-
-
-
-
45
-
-
84911880707
-
-
Bluetooth SIG. Specification of the Bluetooth system, (Accessed 2012-10-12).
-
Bluetooth SIG. Specification of the Bluetooth system, 2001. Available at: http://www.bluetooth.com (Accessed 2012-10-12).
-
(2001)
-
-
-
46
-
-
49149125693
-
-
GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data (concise contribution), Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. PERCOM 2008, Hong Kong, China
-
Zhang W, Wang C, Feng T. GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data (concise contribution), Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. PERCOM 2008, Hong Kong, China, 2008; 179-184.
-
(2008)
, pp. 179-184
-
-
Zhang, W.1
Wang, C.2
Feng, T.3
-
47
-
-
79952493402
-
A security framework for privacy-preserving data aggregation in wireless sensor networks
-
Chan ACF, Castelluccia C. A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 2011; 7(4): 1-45. doi:10.1145/1921621.1921623.
-
(2011)
ACM Transactions on Sensor Networks (TOSN)
, vol.7
, Issue.4
, pp. 1-45
-
-
Chan, A.C.F.1
Castelluccia, C.2
-
48
-
-
48049100992
-
-
4th Annual IEEE Communications Society Conference on Sensor, Mesh and ad Hoc Communications and Networks, 2007. SECON '07, San Diego, CA, USA
-
Carbunar B, Yu Y, Shi L, Pearce M, Vasudevan V. Query privacy in wireless sensor networks, 4th Annual IEEE Communications Society Conference on Sensor, Mesh and ad Hoc Communications and Networks, 2007. SECON '07, San Diego, CA, USA, 2007; 203-212, doi:10.1109/SAHCN.2007.4292832.
-
(2007)
Query privacy in wireless sensor networks
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, L.3
Pearce, M.4
Vasudevan, V.5
-
50
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
2005. ICDCS 2005, Columbus, Ohio, USA
-
Kamat P, Zhang Y, Trappe W, Ozturk C. Enhancing source-location privacy in sensor network routing, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, 2005. ICDCS 2005, Columbus, Ohio, USA, 2005; 599-608, doi:10.1109/ICDCS.2005.31.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
51
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
Special Issue on Security in Wireless Mobile Computing Systems. Elsevier Science Publishers B.V.: Amsterdam, The Netherlands
-
Deng J, Han R, Mishra S. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. In Elsevier Pervasive and Mobile Computing Journal, vol.2, Special Issue on Security in Wireless Mobile Computing Systems. Elsevier Science Publishers B.V.: Amsterdam, The Netherlands, 2006; 159-186.
-
(2006)
Elsevier Pervasive and Mobile Computing Journal
, vol.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
52
-
-
84865603465
-
Robust probabilistic fake packet injection for receiver-location privacy in WSN
-
LNCS. Springer: Berlin, Heidelberg
-
Rios R, Cuellar J, Lopez J. Robust probabilistic fake packet injection for receiver-location privacy in WSN. In 17th European Symposium on Research in Computer Security (ESORICS 2012), vol.7459, LNCS. Springer: Berlin, Heidelberg, 2012; 163-180, doi:10.1007/978-3-642-33167-1 10.
-
(2012)
17th European Symposium on Research in Computer Security (ESORICS 2012)
, vol.7459
, pp. 163-180
-
-
Rios, R.1
Cuellar, J.2
Lopez, J.3
-
53
-
-
84911938513
-
-
Privacy Rights Clearinghouse. Privacy in the age of the smartphone,(Accessed 2012-10-12).
-
Privacy Rights Clearinghouse. Privacy in the age of the smartphone, 2005. Available at: http://bit.ly/NkNlyM (Accessed 2012-10-12).
-
(2005)
-
-
-
54
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford A, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing 2003; 2(1): 46-55, doi:10.1109/MPRV.2003.1186725.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
55
-
-
12344300295
-
Privacy issues in location-aware mobile devices
-
2004, Big Island, Hawaii, USA, 50127.2 (10 pages)
-
Minch R. Privacy issues in location-aware mobile devices, Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004, Big Island, Hawaii, USA, 2004; 50127.2 (10 pages). doi:10.1109/HICSS.2004.1265320.
-
(2004)
Proceedings of the 37th Annual Hawaii International Conference on System Sciences
-
-
Minch, R.1
-
56
-
-
67650320950
-
A survey of computational location privacy
-
Krumm J. A survey of computational location privacy. Personal Ubiquitous Computing 2009; 13(6): 391-399, doi:10.1007/s00779-008-0212-5.
-
(2009)
Personal Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
57
-
-
79955570859
-
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
OSDI'10. USENIX Association: Berkeley, CA, USA
-
Enck W, Gilbert P, Chun B-G, Cox LP., Jung J, McDaniel P, Sheth AN. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10. USENIX Association: Berkeley, CA, USA, 2010; 1-6.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
58
-
-
80755187778
-
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
-
CCS '11. ACM: New York, NY, USA
-
Hornyack P, Han S, Jung J, Schechter S, Wetherall D. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11. ACM: New York, NY, USA, 2011; 639-652, doi:10.1145/2046707.2046780.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
59
-
-
77956382087
-
A survey of mobile phone sensing
-
Lane ND, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell AT. A survey of mobile phone sensing. IEEE Communications Magazine 2010; 48(9): 140-150.
-
(2010)
IEEE Communications Magazine
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.D.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.T.6
-
60
-
-
80052696161
-
A survey on privacy in mobile participatory sensing applications
-
Christin D, Reinhardt A, Kanhere SS, Hollick M. A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 2011; 84(11): 1928-1946, doi:10.1016/j.jss.2011.06.073.
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.11
, pp. 1928-1946
-
-
Christin, D.1
Reinhardt, A.2
Kanhere, S.S.3
Hollick, M.4
-
61
-
-
74049152260
-
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, Chicago, IL, USA
-
Ristenpart T, Tromer E, Shacham H, Savage S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, Chicago, IL, USA, 2009; 199-212, doi:10.1145/1653662.1653687.
-
(2009)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
62
-
-
77957933159
-
-
Preventing information leakage from indexing in the cloud, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), Miami, Florida, USA
-
Squicciarini A, Sundareswaran S, Lin D. Preventing information leakage from indexing in the cloud, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), Miami, Florida, USA, 2010; 188-195, doi:10.1109/CLOUD.2010.82.
-
(2010)
, pp. 188-195
-
-
Squicciarini, A.1
Sundareswaran, S.2
Lin, D.3
-
63
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
2010 Proceedings IEEE INFOCOM, San Diego, CA, USA
-
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing, 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 2010; 1-9, doi:10.1109/INFCOM.2010.5462173.
-
(2010)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
64
-
-
77950587463
-
Privacy as a service: privacy-aware data storage and processing in cloud computing architectures
-
Eighth IEEE international Conference on Dependable, Autonomic and Secure Computing, 2009. DASC '09, Changzhou, China
-
Itani W, Kayssi A, Chehab A. Privacy as a service: privacy-aware data storage and processing in cloud computing architectures, Eighth IEEE international Conference on Dependable, Autonomic and Secure Computing, 2009. DASC '09, Changzhou, China, 2009; 711-716, doi:10.1109/DASC.2009.139.
-
(2009)
, pp. 711-716
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
65
-
-
84969931080
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
HotSec'10. USENIX Association: Berkeley, CA, USA
-
VanDijk M, Juels A. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proceedings of the 5th USENIX Conference on Hot Topics in Security, HotSec'10. USENIX Association: Berkeley, CA, USA, 2010; 1-8.
-
(2010)
Proceedings of the 5th USENIX Conference on Hot Topics in Security
, pp. 1-8
-
-
VanDijk, M.1
Juels, A.2
-
66
-
-
84911933782
-
-
COSM-connect to your world, (Accessed 2013-01-30).
-
COSM-connect to your world, 2013. Available at: https://cosm.com/ (Accessed 2013-01-30).
-
(2013)
-
-
-
67
-
-
84911875734
-
-
ARRAYENT-the platform for connected products (Accessed 2013-01-30).
-
ARRAYENT-the platform for connected products, 2013. Available at: http://www.arrayent.com/ (Accessed 2013-01-30).
-
(2013)
-
-
-
68
-
-
84911896255
-
-
Auto-ID Labs. Architecting the Internet of things (Accessed 2013-02-04).
-
Auto-ID Labs. Architecting the Internet of things, 2013. Available at: http://www.autoidlabs.org/ (Accessed 2013-02-04).
-
(2013)
-
-
-
69
-
-
70349286554
-
A capacitive touch interface for passive RFID tags
-
2009 IEEE International Conference on RFID
-
Sample A, Yeager D, Smith J. A capacitive touch interface for passive RFID tags, 2009 IEEE International Conference on RFID, 2009; 103-109, doi:10.1109/RFID.2009.4911212.
-
(2009)
, pp. 103-109
-
-
Sample, A.1
Yeager, D.2
Smith, J.3
-
70
-
-
0000981743
-
Information privacy: measuring individuals' concerns about organizational practices
-
Smith H, Milberg S, Burke S. Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly 1996: 167-196.
-
(1996)
MIS Quarterly
, pp. 167-196
-
-
Smith, H.1
Milberg, S.2
Burke, S.3
-
71
-
-
44849128918
-
What are customers looking at?
-
2007. AVSS 2007., London, UK
-
Liu X, Krahnstoever N, Yu T, Tu P. What are customers looking at? IEEE Conference on Advanced Video and Signal Based Surveillance, 2007. AVSS 2007., London, UK, 2007; 405-410, doi:10.1109/AVSS.2007.4425345.
-
(2007)
IEEE Conference on Advanced Video and Signal Based Surveillance
, pp. 405-410
-
-
Liu, X.1
Krahnstoever, N.2
Yu, T.3
Tu, P.4
-
72
-
-
44849134836
-
Video analytics for retail
-
2007. AVSS 2007, London, UK
-
Senior AW, Brown L, Hampapur A, et al.Video analytics for retail, IEEE Conference on Advanced Video and Signal Based Surveillance, 2007. AVSS 2007, London, UK, 2007; 423-428, doi:10.1109/AVSS.2007.4425348.
-
(2007)
IEEE Conference on Advanced Video and Signal Based Surveillance
, pp. 423-428
-
-
Senior, A.W.1
Brown, L.2
Hampapur, A.3
-
73
-
-
84911940069
-
Facedeals lets you check in to venues with your face
-
WIRED Magazine (Accessed 2012-10-12).
-
Solon O. Facedeals lets you check in to venues with your face. WIRED Magazine, 2012. Available at: http://bit.ly/Pdgsry (Accessed 2012-10-12).
-
(2012)
-
-
Solon, O.1
-
74
-
-
84911891566
-
-
Siris großer Bruder. Technology Review (Accessed 2012-10-12).
-
Talbot D. Siris großer Bruder. Technology Review, 2012. Avaible at: http://bit.ly/RUyLBS (Accessed 2012-10-12).
-
(2012)
-
-
Talbot, D.1
-
77
-
-
77951201056
-
Privacy-preserving data publishing: a survey of recent developments
-
14:1-14:53
-
Fung B, Wang K, Chen R, Yu P. Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys 2010; 42(4): 14:1-14:53, doi:10.1145/1749603.1749605.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
78
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
CCS '02. ACM: New York, NY, USA
-
Camenisch J, VanHerreweghen E. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02. ACM: New York, NY, USA, 2002; 21-30, doi:10.1145/586110.586114.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 21-30
-
-
Camenisch, J.1
VanHerreweghen, E.2
-
79
-
-
77953603480
-
Privacy and identity management for everyone
-
DIM '05. ACM: New York, NY, USA
-
Camenisch J, Shelat A, Sommer D, et al. Privacy and identity management for everyone. In Proceedings of the 2005 Workshop on Digital Identity Management, DIM '05. ACM: New York, NY, USA, 2005; 20-27, doi:10.1145/1102486.1102491.
-
(2005)
Proceedings of the 2005 Workshop on Digital Identity Management
, pp. 20-27
-
-
Camenisch, J.1
Shelat, A.2
Sommer, D.3
-
80
-
-
84911947752
-
-
A face is exposed for AOL searcher no. 4417749. New York Times (Accessed 2012-10-12).
-
Barbaro M, Zeller T. A face is exposed for AOL searcher no. 4417749. New York Times, 2006. Available at: http://nyti.ms/H6vd2 (Accessed 2012-10-12).
-
(2006)
-
-
Barbaro, M.1
Zeller, T.2
-
81
-
-
77953213147
-
Myths and fallacies of "personally identifiable information"
-
Narayanan A, Shmatikov V. Myths and fallacies of "personally identifiable information". Communications of the ACM 2010; 53: 24-26, doi:10.1145/1743546.1743558.
-
(2010)
Communications of the ACM
, vol.53
, pp. 24-26
-
-
Narayanan, A.1
Shmatikov, V.2
-
82
-
-
82555187188
-
A systematic review of re-identification attacks on health data
-
ElEmam K, Jonker E, Arbuckle L, Malin B. A systematic review of re-identification attacks on health data. PLoS ONE 2011; 6(12), doi:10.1371/journal.pone.0028071.
-
(2011)
PLoS ONE
, vol.6
, Issue.12
-
-
ElEmam, K.1
Jonker, E.2
Arbuckle, L.3
Malin, B.4
-
83
-
-
85008013311
-
Stalked by satellite-an alarming rise in GPS-enabled harassment
-
Voelcker J. Stalked by satellite-an alarming rise in GPS-enabled harassment. IEEE Spectrum 2006; 43(7): 15-16, doi:10.1109/MSPEC.2006.1652998.
-
(2006)
IEEE Spectrum
, vol.43
, Issue.7
, pp. 15-16
-
-
Voelcker, J.1
-
84
-
-
78650620182
-
Privacy in location-based services: a system architecture perspective
-
Chow C, Mokbel M. Privacy in location-based services: a system architecture perspective. SIGSPATIAL Special 2009; 1(2): 23-27, doi:10.1145/1567253.1567258.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 23-27
-
-
Chow, C.1
Mokbel, M.2
-
85
-
-
84862777858
-
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
-
Toch E, Wang Y, Cranor LF. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-Adapted Interaction 2012; 22(1): 203-220, doi:10.1007/s11257-011-9110-z.
-
(2012)
User Modeling and User-Adapted Interaction
, vol.22
, Issue.1
, pp. 203-220
-
-
Toch, E.1
Wang, Y.2
Cranor, L.F.3
-
86
-
-
84911943657
-
-
Path Intelligence. Pedestrian measurement (Accessed 2013-01-31).
-
Path Intelligence. Pedestrian measurement, 2012. Available at: http://www.pathintelligence.com/ (Accessed 2013-01-31).
-
(2012)
-
-
-
87
-
-
84911915590
-
-
Nearbuy. Nearbuy micro location (Accessed 2013-02-04).
-
Nearbuy. Nearbuy micro location, 2013. Available at: http://bit.ly/14XgkE6 (Accessed 2013-02-04).
-
(2013)
-
-
-
88
-
-
78650620182
-
Privacy in location-based services: a system architecture perspective
-
Chow C, Mokbel M. Privacy in location-based services: a system architecture perspective. Sigspatial Special 2009; 1(2): 23-27.
-
(2009)
Sigspatial Special
, vol.1
, Issue.2
, pp. 23-27
-
-
Chow, C.1
Mokbel, M.2
-
89
-
-
1142268161
-
Privacy, economics, and price discrimination on the internet
-
ICEC '03. ACM: New York, NY, USA
-
Odlyzko A. Privacy, economics, and price discrimination on the internet. In Proceedings of the 5th International Conference on Electronic Commerce, ICEC '03. ACM: New York, NY, USA, 2003; 355-366, doi:10.1145/948005.948051.
-
(2003)
Proceedings of the 5th International Conference on Electronic Commerce
, pp. 355-366
-
-
Odlyzko, A.1
-
90
-
-
84911885405
-
-
Apple-nutzer zahlen mehr für hotelzimmer (Accessed 2012-10-12).
-
Kwasniewski N. Apple-nutzer zahlen mehr für hotelzimmer, 2012. Availabe at: http://bit.ly/MRBTwT (Accessed 2012-10-12).
-
(2012)
-
-
Kwasniewski, N.1
-
91
-
-
23944463649
-
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
-
CITC5 '04. ACM: New York, NY, USA
-
Orgill G, Romney G, Bailey M, Orgill P. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. In Proceedings of the 5th Conference on Information Technology Education, CITC5 '04. ACM: New York, NY, USA, 2004; 177-181, doi:10.1145/1029533.1029577.
-
(2004)
Proceedings of the 5th Conference on Information Technology Education
, pp. 177-181
-
-
Orgill, G.1
Romney, G.2
Bailey, M.3
Orgill, P.4
-
92
-
-
84911865789
-
-
Social networks scan for sexual predators, with uneven results. Reuters (Accessed 2013-02-07).
-
Menn J. Social networks scan for sexual predators, with uneven results. Reuters, 2012. Available at: http://reut.rs/Nnejb7 (Accessed 2013-02-07).
-
(2012)
-
-
Menn, J.1
-
93
-
-
38849161575
-
Privacy-enhanced web personalization
-
Springer-Verlag: Berlin, Heidelberg
-
Kobsa A. Privacy-enhanced web personalization. In The Adaptive Web. Springer-Verlag: Berlin, Heidelberg, 2007; 628-670.
-
(2007)
The Adaptive Web
, pp. 628-670
-
-
Kobsa, A.1
-
94
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
New York, NY, USA
-
Rastogi V, Nath S. Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD '10, New York, NY, USA, 2010; 735-746, doi:10.1145/1807167.1807247.
-
(2010)
Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD '10
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
95
-
-
84911920239
-
-
Woman finds disturbing nude photos on 'new' smartphone (Accessed 2012-10-12).
-
Woman finds disturbing nude photos on 'new' smartphone, 2012. Available at: http://nbcnews.to/Qpqg0w (Accessed 2012-10-12).
-
(2012)
-
-
-
97
-
-
84911924986
-
Most burglars using Facebook and Twitter to target victims, survey suggests
-
The Telegraph (Accessed 2013-02-07).
-
Bloxham A. Most burglars using Facebook and Twitter to target victims, survey suggests. The Telegraph, 2011. Available at: http://bit.ly/pOL8MX (Accessed 2013-02-07).
-
(2011)
-
-
Bloxham, A.1
|