Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Applying privacy on the dissemination of location information
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Client-side web mining for community formation in peer-to-peer environments
ACM SIGKDD Explorations Newsletter
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A service provisioning system for distributed personalization with private data protection
Journal of Systems and Software
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Access control management for ubiquitous computing
Future Generation Computer Systems
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services
Research in Cryptology
Location privacy and anonymity preserving routing for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
On providing sink anonymity for sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Privacy now and in the age of ambient intelligence
International Journal of Electronic Security and Digital Forensics
Middleware for pervasive spaces: balancing privacy and utility
Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
A semantic approach for building pervasive spaces
Proceedings of the 6th Middleware Doctoral Symposium
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Enabling location privacy and medical data encryption in patient telemonitoring systems
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Dealing with anonymity in wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Managing pervasive environment privacy using the "fair trade" metaphor
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Middleware for pervasive spaces: balancing privacy and utility
Middleware'09 Proceedings of the ACM/IFIP/USENIX 10th international conference on Middleware
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A generic privacy enhancing technology for pervasive computing environments
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Share the secret: enabling location privacy in ubiquitous environments
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
ANOSIP: anonymizing the SIP protocol
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
On location privacy and quality of information in participatory sensing
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
Security and privacy issues for the network of the future
Security and Communication Networks
International Journal of Advanced Pervasive and Ubiquitous Computing
Hi-index | 0.00 |
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design process, we will end up creating a very effective distributed surveillance system, which would be adream come true for electronic stalkers and "big brothers."We present a protocol, which preserves the privacy of users and keeps their communication anonymous. In effect, we create a "mist" that conceals users from the system and other users. Yet, users will still be able to enjoy seamless interaction with services and other entities that wander within the ubiquitous computing environment.