In search of user privacy protection in ubiquitous computing | IEEE Conference Publication | IEEE Xplore