共 50 条
- [21] Privacy Enhanced Access Control in Pervasive Computing Environments [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
- [22] Trust based privacy protection method in pervasive computing [J]. Journal of Networks, 2012, 7 (02) : 322 - 328
- [23] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms [J]. 2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
- [24] The semantic production of space: pervasive computing and the urban landscape [J]. ENVIRONMENT AND PLANNING A-ECONOMY AND SPACE, 2014, 46 (04): : 837 - 851
- [25] Security and privacy in pervasive computing state of the art and future directions [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 285 - 289
- [26] An efficient privacy-preserving localization algorithm for pervasive computing [J]. 2017 26th International Conference on Computer Communications and Networks, ICCCN 2017, 2017,
- [27] Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing [J]. AMBIENT ASSISTIVE HEALTH AND WELLNESS MANAGEMENT IN THE HEART OF THE CITY, PROCEEDING, 2009, 5597 : 166 - 173
- [28] An Efficient Privacy-Preserving Localization Algorithm for Pervasive Computing [J]. 2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
- [30] Obligations: Building a bridge between personal and enterprise privacy in pervasive computing [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 173 - +