Routing through the mist: privacy preserving communication in ubiquitous computing environments, Proceedings 22nd International Conference on Distributed Computing Systems, pp.74-83, 2002. ,
DOI : 10.1109/ICDCS.2002.1022244
Location privacy in pervasive computing, IEEE Pervasive Computing, vol.2, issue.1, pp.46-55, 2003. ,
DOI : 10.1109/MPRV.2003.1186725
The effects of filtered video on awareness and privacy, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, pp.1-10, 2000. ,
DOI : 10.1145/358916.358935
Rethinking Public Key Infrastructures and Digital Certificates: building in privacy, 2000. ,
Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005. ,
DOI : 10.1145/1102486.1102491
Group Signatures, Eurocrypt '91, pp.257-265, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
DOI : 10.1145/358549.358563
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Development and evaluation of emerging design patterns for ubiquitous computing, Proceedings of the 2004 conference on Designing interactive systems processes, practices, methods, and techniques, DIS '04, pp.233-242, 2004. ,
DOI : 10.1145/1013115.1013148
Perceptual user interfaces: things that see, Communications of the ACM, vol.43, issue.3, pp.54-64, 2000. ,
DOI : 10.1145/330534.330540
Tor: The second-generation onion router, Proceedings of the 13th USENIX, pp.303-320, 2004. ,
A Formal Model of Obfuscation and Negotiation for Location Privacy, Proceedings of PERVASIVE 2005, pp.152-170, 2005. ,
DOI : 10.1007/11428572_10
Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.193-206, 2002. ,
DOI : 10.1145/586110.586137
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003. ,
DOI : 10.1145/1066116.1189037
An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004. ,
DOI : 10.1145/990064.990087
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems An anonymous communication technique using dummies for location-based services, Proceedings of ACM CSCW '96 Proceedings of the IEEE ICPS'05, pp.248-257, 1996. ,
Towards Meeting the Privacy Challenge: Adapting DRM, ACM CCS-9 Workshop, pp.118-136, 2003. ,
DOI : 10.1007/978-3-540-44993-5_8
European disappearing computer privacy design guidelines v1.1, 2004. ,
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, pp.273-291, 2001. ,
DOI : 10.1007/3-540-45427-6_23
A Privacy Awareness System for Ubiquitous Computing Environments, pp.237-245, 2002. ,
DOI : 10.1007/3-540-45809-3_19
The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness, pp.297-314, 2003. ,
DOI : 10.1007/978-3-540-39653-6_24
Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006. ,
DOI : 10.1145/1151030.1151053
Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments, 7th International Conference on Mobile Data Management (MDM'06), p.3, 2006. ,
DOI : 10.1109/MDM.2006.78
URL : https://hal.archives-ouvertes.fr/inria-00415112
The platform for privacy preferences, Communications of the ACM, vol.42, issue.2, pp.48-55, 1999. ,
DOI : 10.1145/293411.293455
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
How to Leak a Secret, Proceedings of ASIACRYPT '01, pp.552-565, 2001. ,
DOI : 10.1007/3-540-45682-1_32
P5: A protocol for scalable anonymous communication, Proceedings of IEEE SP '02, p.58, 2002. ,
Evaluating image filtering based techniques in media space applications, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.11-18, 1998. ,
DOI : 10.1145/289444.289450