共 50 条
- [3] Everyobjects in the pervasive computing landscape [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: COOPIS, DOA, GADA, AND ODBASE PT 2, PROCEEDINGS, 2006, 4276 : 1434 - 1434
- [4] Protection of privacy in pervasive computing environments [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
- [5] Privacy preserving protocol for pervasive computing [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (11): : 103 - 105
- [6] Privacy in pervasive computing and open issues [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 147 - +
- [8] Survey on location privacy in pervasive computing [J]. PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 23 - 34
- [9] Towards security and privacy for pervasive computing [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15
- [10] Pervasive Computing, Privacy and Distribution of the Self [J]. INFORMATION, 2011, 2 (02) : 360 - 371