The active badge location system
ACM Transactions on Information Systems (TOIS)
Capacity of Ad Hoc wireless networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Access control to information in pervasive computing environments
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Passive data link layer 802.11 wireless device driver fingerprinting
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Instrumenting the city: developing methods for observing and understanding the digital cityscape
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Privacy-preserving 802.11 access-point discovery
Proceedings of the second ACM conference on Wireless network security
Blue-Fi: enhancing Wi-Fi performance using bluetooth signals
Proceedings of the 7th international conference on Mobile systems, applications, and services
Human behavior and challenges of anonymizing WLAN traces
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Hi-index | 0.00 |
Optimistic synchronization allows concurrent execution of critical sections while performing dynamic conflict detection and recovery. Optimistic synchronization will increase performance only if critical regions are data independent--concurrent critical ...