The active badge location system
ACM Transactions on Information Systems (TOIS)
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Security: for ubiquitous computing
Security: for ubiquitous computing
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Will your digital butlers betray you?
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
Database nation
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Ubiquitous computing has been a fashionable research theme for the past twenty years, so much so that many research groups have felt the urge to give it a different name (pervasive computing, calm computing, ambient intelligence etc etc) in order to claim that they were doing something new or at least slightly different from everyone else. One of these many alternate names has been "context-aware computing", to suggest systems and devices that would sense the "context" of a situation and behave accordingly: for example, a mobile phone might sense that its owner is "in a meeting" and automatically switch from ringtone to vibration mode.