共 21 条
[1]
AWARENESS NETWORKING IN WIRELESS ENVIRONMENTS
[J].
IEEE VEHICULAR TECHNOLOGY MAGAZINE,
2009, 4 (03)
:48-54
[2]
Beach Aaron, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P1036, DOI 10.1109/CSE.2009.243
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Analyzing Privacy Designs of Mobile Social Networking Applications
[J].
EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS,
2008,
:83-88
[6]
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[9]
Miluzzo E, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P337
[10]
Müller S, 2009, LECT NOTES COMPUT SC, V5461, P20, DOI 10.1007/978-3-642-00730-9_2