Author:
Lin Jialiu,Benisch Michael,Sadeh Norman,Niu Jianwei,Hong Jason,Lu Banghui,Guo Shaohui
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference39 articles.
1. Barkhuus L, Brown B, Bell M, Hall M, Sherwood S, Chalmers M (2008) From Awareness to repartee: sharing location within social groups. Paper presented at the CHI
2. Benisch M, Kelley P, Sadeh N, Cranor L (2010) Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Pers Ubiquit Comput. doi: 10.1007/s00779-010-0346-0
3. Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. Paper presented at the 8th IEEE workshop on mobile computing systems and applications
4. Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. Paper presented at the MobiSys, Boston
5. Iachello G, Smith I, Consolvo S, Abowd G, Hughes J, Howard J, Potter F, Scott J, Sohn T, Hightower J, LaMarca A (2005) Control, deception, and communication: evaluating the deployment of a location-enhanced messaging service. Paper presented at the UbiComp
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献