共 50 条
- [31] Quantizing Personal Privacy in Ubiquitous Computing KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1653 - 1667
- [32] Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (03): : 686 - 689
- [33] Three way authentication protocol for privacy preserving and ownership authentication transfer for ubiquitous computing devices 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (13): : 430 - 443
- [34] Three way authentication protocol for privacy preserving and ownership authentication transfer for ubiquitous computing devices WSEAS Transactions on Communications, 2014, 13 : 430 - 443
- [35] The Privacy Preserving In Computing Offloading 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1102 - 1105
- [37] Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 316 - 329
- [38] A multiagent architecture for privacy-preserving ID-based service in ubiquitous computing environment AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 14 - 25
- [39] Ubiquitous privacy-preserving identity managment PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 589 - 603
- [40] The security challenges of ubiquitous computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1