Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
A One Round Protocol for Tripartite Diffie–Hellman
Journal of Cryptology
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
A privacy-aware trajectory tracking query engine
ACM SIGKDD Explorations Newsletter
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Location privacy in mobile computing environments
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
Non-repudiation service is crucial to electronic commerce. We have made some research of ATL logic method and its applications in multi-party security protocols formalized analysis. A typical multi-party non-repudiation protocol is modeled and analyzed ...