-
5
-
-
84858855451
-
Design Considerations for High Fan-in Systems: The HiFi approach
-
Jan
-
M. Franklin, S. Jeffery, S. Krishnamurthy, F. Reiss, S. Rizvi, E. Wu, O. Cooper, A. Edakkunni, W. Hong. Design Considerations for High Fan-in Systems: The HiFi approach. In Proceedings of the CIDR Conference. Pp. 290-304. Jan. 2005
-
(2005)
Proceedings of the CIDR Conference
, pp. 290-304
-
-
Franklin, M.1
Jeffery, S.2
Krishnamurthy, S.3
Reiss, F.4
Rizvi, S.5
Wu, E.6
Cooper, O.7
Edakkunni, A.8
Hong, W.9
-
6
-
-
3042827192
-
IrisNet: An Architecture for a Worldwide Sensor Web
-
Dec
-
P. Gibbons, B. Karp, Y. Ke, S. Nath, S. Seshan. IrisNet: An Architecture for a Worldwide Sensor Web. IEEE Pervasive Computing 2(4):22-33, Dec. 2003
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.4
, pp. 22-33
-
-
Gibbons, P.1
Karp, B.2
Ke, Y.3
Nath, S.4
Seshan, S.5
-
7
-
-
33747651434
-
-
ITU Report, Nov
-
International Telecommunication Union. The Internet of Things. ITU Report, Nov. 2005
-
(2005)
The Internet of Things
-
-
-
11
-
-
38149006260
-
What Are Possible Security Threats in Ubiquitous Sensor Network Environment?
-
M. Kim, Y. Lee, J. Ryou. What Are Possible Security Threats in Ubiquitous Sensor Network Environment? Lecture Notes in Computer Science 4773:437-446, 2007
-
(2007)
Lecture Notes in Computer Science
, vol.4773
, pp. 437-446
-
-
Kim, M.1
Lee, Y.2
Ryou, J.3
-
12
-
-
84945556728
-
Privacy by Design-Principles of Privacy-aware Ubiquitous Systems
-
Oct
-
M. Langheinrich. Privacy by Design-Principles of Privacy-aware Ubiquitous Systems. In Proceedings of Ubicomp. Pp. 273-291. Oct. 2001
-
(2001)
Proceedings of Ubicomp
, pp. 273-291
-
-
Langheinrich, M.1
-
14
-
-
60149097098
-
Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel
-
Sept
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik. Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In Proceedings of MobiCom. Pp. 128-139. Sept. 2008
-
(2008)
Proceedings of MobiCom
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
15
-
-
47949105584
-
AWARE: Platform for Autonomous Self-deploying and Operation of Wireless Sensor-actuator Networks Cooperating with Unmanned AeRial vehiclEs
-
June
-
Ollero et al. AWARE: Platform for Autonomous Self-deploying and Operation of Wireless Sensor-actuator Networks Cooperating with Unmanned AeRial vehiclEs. In Proceedings of IEEE International Workshop on Safety, Security and Rescue Robotics. Pp. 1-6. June 2007
-
(2007)
Proceedings of IEEE International Workshop on Safety, Security and Rescue Robotics
, pp. 1-6
-
-
Ollero1
-
16
-
-
38049010942
-
Information confinement, privacy, and security in RFID systems
-
Dec
-
R. D. Pietro, R. Molva. Information confinement, privacy, and security in RFID systems. In Proceedings of ESORICS. Pp. 187-202. Dec. 2007
-
(2007)
Proceedings of ESORICS
, pp. 187-202
-
-
Pietro, R.D.1
Molva, R.2
-
18
-
-
85042882500
-
-
Presentation at RSA Conference Europe, Oct
-
B. Schneier. The Future of Privacy. Presentation at RSA Conference Europe, Oct. 2008
-
(2008)
The Future of Privacy
-
-
Schneier, B.1
-
20
-
-
11844281385
-
State-of-the-art in Privacy Preserving Data Mining
-
Mar
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, Y. Theodoridis. State-of-the-art in Privacy Preserving Data Mining. ACM SIGMOD Record 33(1):50-57, Mar. 2004
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
21
-
-
45449105171
-
Information Accountability
-
June
-
D. J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, G. J. Sussman. Information Accountability. Communications of the ACM 51(6):82-87, June 2008
-
(2008)
Communications of the ACM
, vol.51
, Issue.6
, pp. 82-87
-
-
Weitzner, D.J.1
Abelson, H.2
Berners-Lee, T.3
Feigenbaum, J.4
Hendler, J.5
Sussman, G.J.6
|