1. 1) Ahmed, M., Quercia, D. and Hailes, S.: A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations, 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM, pp.598-602 (2005).
2. 2) Briggs, P. and Olivier, P.L.: Biometric daemons: Authentication via electronic pets, Proc. CHI 2008, New York, NY, USA, ACM, pp.2423-2432 (online), DOI:http://doi.acm.org/10.1145/1358628.1358699 (2008).
3. 3) Camp, L.J.: Design for Trust in Ambient and Ubiquitous Computing, Proc. 6th International Conference on Autonomic and Trusted Computing, Berlin, Heidelberg, Springer-Verlag (2009).
4. 4) Chen, G. and Kotz, D.: A survey of context-aware mobile computing research, Technical Report, Department of Computer Science, Dartmouth College (2000).
5. 5) Corner, M.D. and Noble, B.D.: Zero-interaction authentication, Proc. ACM International Conference on Mobile Computing and Communications, Atlanta, GA (2002).