, Volume 40, Issue 5, pp 466–491 | Cite as

GI-Dagstuhl Seminar 16353 on Aware Machine to Machine Communication

  • Redaktion


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Arumaithurai M, Chen J, Monticelli E, Fu X, Ramakrishnan KK (2014) Exploiting icn for flexible management of software-defined networks. In: Proceedings of the 1st international conference on Information-centric networking. ACMGoogle Scholar
  2. 2.
    Böhme R, Christin N, Edelman B, Moore T (2015) Bitcoin: Economics, Technology, and Governance. J Econ Perspect 29(2):213–238Google Scholar
  3. 3.
    Chen J, Arumaithurai M, Fu X, Ramakrishnan KK (2012) G-COPSS: A Content Centric Communication Infrastructure for Gaming. In: ICDCSGoogle Scholar
  4. 4.
    Halpern SD, Ubel PA, Asch DA (2007) Harnessing the power of default options to improve health care. New Engl J Med 357(13):1340–1344Google Scholar
  5. 5.
    Lightfoot G, Wisniewski TP (2014) Information asymmetry and power in a surveillance society. Inform Organ 24(4):214–235Google Scholar
  6. 6.
    Murphy RS (1995) Property rights in personal information: an economic defense of privacy. Geo LJ 84:2381Google Scholar
  7. 7.
    Sahai A, Waters B (2005) Fuzzy Identity-Based Encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 457–473Google Scholar
  8. 8.
    Schuermann D, Sigg S (2013) Secure communication based on ambient audio. IEEE T Mobile Comput 12(2):Google Scholar
  9. 9.
    Schwartz PM (2004) Property, privacy, and personal data. Harvard Law Rev :2056–2128Google Scholar
  10. 10.
    Sigg S, Schuermann D, Ji Y (2011) Pintext: A Framework for Secure Communication Based on Context. In: Proceedings of the Eighth Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2011)Google Scholar
  11. 11.
    Stojano F, Anderson R (1999) The Resurrecting Duckling: Security Issues for Wireless Ad Hoc Networks. In: Seventh International Workshop Proceedings, Lecture Notes in Computer ScienceGoogle Scholar
  12. 12.
    Tuyls P, Skoric B, Kevenaar T (2007) Security with Noisy Data. Springer-VerlagGoogle Scholar

Copyright information

© Springer-Verlag GmbH Deutschland 2017

Authors and Affiliations

  • Redaktion

There are no affiliations available

Personalised recommendations