Security Issues in Ubiquitous Computing*
- 1 January 2010
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 42 references indexed in Scilit:
- Dismantling MIFARE ClassicLecture Notes in Computer Science, 2008
- Passive capture and ensuing issues for a personal lifetime storePublished by Association for Computing Machinery (ACM) ,2004
- Privacy in electronic commerce and the economics of immediate gratificationPublished by Association for Computing Machinery (ACM) ,2004
- How Iris Recognition WorksIEEE Transactions on Circuits and Systems for Video Technology, 2004
- Controlled physical random functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003
- MyLifeBitsPublished by Association for Computing Machinery (ACM) ,2002
- Intercepting mobile communicationsPublished by Association for Computing Machinery (ACM) ,2001
- A look at human interaction with pervasive computersIBM Systems Journal, 1999
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981