Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ShownPass: an easy access control with a displayed password
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Privacy and Anonymity in Personal Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Communications of the ACM - Special issue: RFID
An efficient key establishment scheme for secure aggregating sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Question-based authentication using context data
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
On the Expressiveness of Mobile Synchronizing Petri Nets
Electronic Notes in Theoretical Computer Science (ENTCS)
Energy evaluation of software implementations of block ciphers under memory constraints
Proceedings of the conference on Design, automation and test in Europe
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security - Special issue on CSFW15
An Efficient Device Authentication Protocol Using Bioinformatic
Computational Intelligence and Security
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Intelligent Products: A survey
Computers in Industry
Next generation of transportation & information technologies
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
An adaptive and safe ubicomp for HPC applications
International Journal of Ad Hoc and Ubiquitous Computing
Smart meeting systems: A survey of state-of-the-art and open issues
ACM Computing Surveys (CSUR)
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Trust propagation in small worlds
iTrust'03 Proceedings of the 1st international conference on Trust management
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Privacy enhancing technologies for RFID in retail- an empirical investigation
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A novel adaptive and safe framework for ubicomp
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A hybrid intelligent multimedia service framework in next generation home network environment
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Network coding protocols for secret key distribution
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Proceedings of the 13th international conference on Security protocols
Dynamic privacy management in pervasive sensor networks
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Managing security and privacy in ubiquitous eHealth information interchange
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
An algorithm for prediction of overhead messages in client-server based wireless networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
User-oriented multimedia service using smart sensor agent module in the intelligent home
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Safe authentication method for security communication in ubiquitous
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Information seesaw: availability vs. security management in the UbiComp world
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
uiH-PMAC model suitable for Ubi-Home gateway in ubiquitous intelligent environment
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Real-time intrusion detection in ubiquitous networks with a string-based approach
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
Secure overlay for service centric wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Symbolic semantics for the verification of security properties of mobile petri nets
ATVA'06 Proceedings of the 4th international conference on Automated Technology for Verification and Analysis
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Delegating secure logging in pervasive computing systems
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
An information aggregation scheme of multi-node in ubiquitous sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A Roadmap to the Introduction of Pervasive Information Systems in Healthcare
International Journal of Advanced Pervasive and Ubiquitous Computing
International Journal of Advanced Pervasive and Ubiquitous Computing
Trust-based authentication scheme with user rating for low-resource devices in smart environments
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.