Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Privacy
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Optimized security algorithm for connected vehicular network
Available to Purchase
International Journal of Pervasive Computing and Communications (2023) 19 (5): 799–817.
Published: 02 January 2023
...Deepak Choudhary Purpose As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very...
Journal Articles
An analysis of tools for online anonymity
Available to Purchase
International Journal of Pervasive Computing and Communications (2015) 11 (4): 436–453.
Published: 02 November 2015
... by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity...
Journal Articles
Experiences in managing uncertainty and ignorance in a lightly instrumented smart home
Available to Purchase
International Journal of Pervasive Computing and Communications (2012) 8 (3): 225–249.
Published: 31 August 2012
... that is intrinsic to pervasive computing systems. Design/methodology/approach The paper presents the principles that characterize the context‐aware architecture: the acceptability‐driven design, where privacy and acceptability are favored; the awareness of the gap between the reality of human activity...
Journal Articles
Air‐Writing: a platform for scalable, privacy‐preserving, spatial group messaging
Available to Purchase
International Journal of Pervasive Computing and Communications (2012) 8 (1): 53–78.
Published: 30 March 2012
... in terms of privacy. If a spatial messaging platform could collect the location traces of all its users, detailed profiling would be possible – and, considering commercial value of such profiles, likely. The purpose of this paper is to present Air‐Writing, an approach to spatial messaging that fully...
Journal Articles
LooM: An anonymity quantification method in pervasive computing environments
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 110–123.
Published: 04 April 2008
...Sherali Zeadally; Lu Yan; Miyuki Imada; Masakatsu Ohta; Masayasu Yamaguchi; Sun Yong Kim Purpose The paper's aim is to present a novel anonymity quantification method, LooM (loosely managed privacy protection method) for achieving privacy protection in pervasive computing environments. Design...
