[1]
|
Libelium, “50 Internet of Things Applications,” 2012.
http://www.libelium.com/top_50_iot_sensor_applications_ranking
|
[2]
|
The Strategic Centre for Science, “Technology and Innovation in the Field of ICT, Internet of Things Strategic Research Agenda.” http://www.Internetofthings.fi/
|
[3]
|
Futuretech Alert, “Technology Convergence Leading to the Internet of Things,” Frost & Sullivan, Mountain View, 2012.
|
[4]
|
“The Internet of Things 2012—New Horizons-Cluster Book,” 2012.
http://www.Internet-of-things-research.eu/pdf/IERC_Cluster_Book_2012_WEB.pdf
|
[5]
|
European Commission, Information Society and Media, “Internet of Things in 2020 Roadmap for the Future,” 2008. http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope/270808_IoT_in_2020_Workshop_Report_ V1-1.pdf
|
[6]
|
L. Wu and P. Shao, “Research on the Protection Algorithm and Model of Personal Privacy Information in Internet of Thing,” International Conference on E-Business and E-Government, Guiyang, 6-8 May 2011, pp. 1-4.
|
[7]
|
H. Feng and W. Fu, “Study of Recent Development about Privacy and Security of the Internet of Things,” International Conference on Web Information Systems and Mining, Beijing, 23-24 October 2010, pp. 91-95.
|
[8]
|
D. Gessner, A. Olivereau, A. S. Segura and A. Serbanati, “Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things,” International Conference on Trust, Security and Privacy in Computing and Communications, Heidelberg, 25-27 June 2012, pp. 998-1003.
|
[9]
|
V. Oleshchuk, “Internet of Things and Privacy Preserving Technologies,” International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Grimstad, 17-20 May 2009, pp. 336-340.
|
[10]
|
International Telecommunication Union, “The Internet of Things, Executive Summary.”
http://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf
|
[11]
|
D. J. Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review, Vol. 154, No. 3, 2006, p. 477.
doi:10.2307/40041279
|
[12]
|
T. Kowatsch and W. Maass, “Privacy Concerns and Acceptance of IoT Services,” Internet of Things Intitiative, 2012, pp. 176-187.
|
[13]
|
E. K. Choe, S. Consolvo, J. Jung, B. Harrison and J. A. Kientz, “Living in a Glass House: A Survey of Private Moments in the Home,” Proceedings of the 13th International Conference on Ubiquitous Computing, Beijing, 17-21 September 2011, pp. 41-44.
|
[14]
|
Y. Wang, G. Norcie and L. F. Cranor “Who Is Concerned about What? A Study of American, Chinese and Indian Users Privacy Concerns on Social Network Sites,” International Conference on Trust & Trustworthy Computing, Vol. 6740, 2011, pp. 146-153.
|
[15]
|
D. J. Solove, “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy,” San Diego Law Review, Vol. 44, 2007, p. 74
|