共 25 条
[1]
Adams A., The implications of users' privacy perception on communication and information privacy policies, Proceedings of Telecommunications Policy Research (TPRC), (1999)
[2]
Beresford A., Stajano F., Location privacy in pervasive computing, IEEE Pervasive Computing, 2, 1, pp. 46-55, (2003)
[3]
Chaum D., The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, 1, 1, pp. 65-75, (1988)
[4]
Fasbender A., Kesdogan D., Kubitz O., Analysis of security and privacy in mobile IP, Proceedings of 4th International Conference on Telecommunication Systems, Modelling and Analysis, (1996)
[5]
Information Technology-security Techniques-evaluation Criteria for IT Security, (1999)
[6]
Jendricke U., Kreutzer M., Zugenmaier A., Pervasive privacy with identity management, Proceedings of the Workshop on Security in Ubiquitous Computing, UbiComp 2002, (2002)
[7]
Jiang X., Landay J., Modelling privacy control in context-aware systems, IEEE Pervasive Computing, 1, 3, pp. 59-63, (2002)
[8]
Kesdogan D., Reichl P., Junghrtchen K., Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks, Lecture Notes in Computer Science, 1485, pp. 295-312, (1998)
[9]
Lahlou S., Jegou F., European disappearing computer privacy design guidelines (version 1.1), Ambient Agoras Programme Report (IST-2000-25134), (2004)
[10]
Lahlou S., Langheinrich M., Rocker C., Privacy and trust issues with invisible computers, Communications of the ACM, 48, 3, pp. 59-60, (2005)