共 50 条
[41]
Consumer perceptions of privacy, security and trust in ubiquitous commerce
[J].
Personal and Ubiquitous Computing,
2004, 8
:416-429
[44]
Privacy protection in ubiquitous computing based on privacy label and information flow
[J].
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 2,
2004, 3044
:46-54
[45]
Introduction: Privacy, trust, and identity management
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2011, 6545
:141-149
[48]
HyCPK: Securing Identity Authentication in ubiquitous computing
[J].
IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS,
2015,
:239-246
[49]
Issues with RFID usage in ubiquitous computing applications
[J].
PERVASIVE COMPUTING, PROCEEDINGS,
2004, 3001
:188-193