] Like most information technologies, Mobile and Ubiquitous ] Computing carries a number of security and privacy ] implications. We feel that care should be taken to ] consider these issues when designing Ubicomp systems. In ] this report we will enumerate a number of the privacy ] concerns in Ubicomp and provide a philisophical ] discussion of the importance of addressing these ] problems. In considering these problems we have found ] that a number of Ubicomp techniques are in fact well ] suited to solving security and privacy problems that ] arise in Ubicomp. We will discuss some of these ] techniques in the hope of inspiring further ] consideration. Systems described include a secure RF-ID ] system, an architecture for setting privacy levels based ] on context, and a wearable cryptographic authenticator. This is probably the coolest paper I've ever written, and for one of the coolest classes I ever took. I'm linking this here because I've had to dig it out of Georgia Tech's site twice now and I figure it ought to be easy to find... Security and Privacy in Ubiquitous Computing |