共 50 条
- [1] Protection of privacy in pervasive computing environments [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
- [2] Reusable Pseudonym Privacy Protection in Pervasive Computing [J]. ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2, 2011, 105 : 201 - 205
- [3] Trust Based Pervasive Computing [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1477 - 1480
- [4] Research of privacy protection in smart space model based on Pervasive Computing [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 508 - 511
- [5] Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection [J]. MOBILE COMPUTING, APPLICATIONS, AND SERVICES (MOBICASE 2015), 2015, 162 : 122 - 139
- [6] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms [J]. 2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
- [7] Shadow: A middleware in pervasive computing environment for user controllable privacy protection [J]. SMART SENSING AND CONTEXT, PROCEEDINGS, 2006, 4272 : 143 - +