共 50 条
- [31] Open Services - Need To Restrict Access in Bluetooth INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (05): : 190 - 192
- [33] Routing through the mist: Privacy preserving communication in ubiquitous computing environments 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 74 - 83
- [34] A flexible, privacy-preserving authentication framework for ubiquitous computing environments 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 771 - 776
- [36] Towards the modeling of personal privacy in ubiquitous computing environments COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
- [37] Design requirements for ubiquitous computing environments for healthcare professionals MEDINFO 2004: PROCEEDINGS OF THE 11TH WORLD CONGRESS ON MEDICAL INFORMATICS, PT 1 AND 2, 2004, 107 : 1416 - 1420
- [38] Designing Intelligent User Interface for Ubiquitous Computing Environments 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, 2007, : 12 - 12
- [39] Immersiveness of Ubiquitous Computing Environments Prototypes: A Case Study DISTRIBUTED, AMBIENT, AND PERVASIVE INTERACTIONS, 2015, 9189 : 237 - 248
- [40] Continuum: A Service-Based Software Infrastructure for Ubiquitous Computing 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 336 - +