Privacy and trust issues with invisible computers. Lahlou, S., Langheinrich, M., & Röcker, C. Communications of the ACM, 48(3):59–60, 2005.
Paper bibtex @article{lahlou_privacy_2005,
title = {Privacy and trust issues with invisible computers},
volume = {48},
url = {http://dl.acm.org/citation.cfm?id=1047705},
number = {3},
urldate = {2017-05-19},
journal = {Communications of the ACM},
author = {Lahlou, Saadi and Langheinrich, Marc and Röcker, Carsten},
year = {2005},
pages = {59--60},
file = {[PDF] snu.ac.kr:/home/bob/.mozilla/firefox/r362gfsn.default/zotero/storage/PUDEUBJB/Lahlou et al. - 2005 - Privacy and trust issues with invisible computers.pdf:application/pdf;Snapshot:/home/bob/.mozilla/firefox/r362gfsn.default/zotero/storage/QSFFVAK2/citation.html:text/html}
}
Downloads: 0
{"_id":"t98fqKb5u4PumNzHJ","bibbaseid":"lahlou-langheinrich-rcker-privacyandtrustissueswithinvisiblecomputers-2005","downloads":0,"creationDate":"2017-05-19T15:06:29.538Z","title":"Privacy and trust issues with invisible computers","author_short":["Lahlou, S.","Langheinrich, M.","Röcker, C."],"year":2005,"bibtype":"article","biburl":"http://www.remosco.net/assets/bib/lahlou.bib","bibdata":{"bibtype":"article","type":"article","title":"Privacy and trust issues with invisible computers","volume":"48","url":"http://dl.acm.org/citation.cfm?id=1047705","number":"3","urldate":"2017-05-19","journal":"Communications of the ACM","author":[{"propositions":[],"lastnames":["Lahlou"],"firstnames":["Saadi"],"suffixes":[]},{"propositions":[],"lastnames":["Langheinrich"],"firstnames":["Marc"],"suffixes":[]},{"propositions":[],"lastnames":["Röcker"],"firstnames":["Carsten"],"suffixes":[]}],"year":"2005","pages":"59–60","file":"[PDF] snu.ac.kr:/home/bob/.mozilla/firefox/r362gfsn.default/zotero/storage/PUDEUBJB/Lahlou et al. - 2005 - Privacy and trust issues with invisible computers.pdf:application/pdf;Snapshot:/home/bob/.mozilla/firefox/r362gfsn.default/zotero/storage/QSFFVAK2/citation.html:text/html","bibtex":"@article{lahlou_privacy_2005,\n\ttitle = {Privacy and trust issues with invisible computers},\n\tvolume = {48},\n\turl = {http://dl.acm.org/citation.cfm?id=1047705},\n\tnumber = {3},\n\turldate = {2017-05-19},\n\tjournal = {Communications of the ACM},\n\tauthor = {Lahlou, Saadi and Langheinrich, Marc and Röcker, Carsten},\n\tyear = {2005},\n\tpages = {59--60},\n\tfile = {[PDF] snu.ac.kr:/home/bob/.mozilla/firefox/r362gfsn.default/zotero/storage/PUDEUBJB/Lahlou et al. - 2005 - Privacy and trust issues with invisible computers.pdf:application/pdf;Snapshot:/home/bob/.mozilla/firefox/r362gfsn.default/zotero/storage/QSFFVAK2/citation.html:text/html}\n}\n\n","author_short":["Lahlou, S.","Langheinrich, M.","Röcker, C."],"key":"lahlou_privacy_2005","id":"lahlou_privacy_2005","bibbaseid":"lahlou-langheinrich-rcker-privacyandtrustissueswithinvisiblecomputers-2005","role":"author","urls":{"Paper":"http://dl.acm.org/citation.cfm?id=1047705"},"metadata":{"authorlinks":{"lahlou, s":"https://bibbase.org/show?bib=http://www.remosco.net/assets/bib/lahlou.bib"}},"downloads":0,"html":""},"search_terms":["privacy","trust","issues","invisible","computers","lahlou","langheinrich","röcker"],"keywords":[],"authorIDs":["591f09f57f5ebfe41c00000a","5de8d45d9e80cdde01000197","5e51e8628240c0df01000022","5e5a4e0e22eebcde01000079","AAdB5t6CJdisCMD3q","bNy9it2ff5t7X3bD3","c7LeKrR25jaMPD7f2","tmC8gpMNe4JR6qy8e"],"dataSources":["SHYBjakg26EoMWCgv"]}