The Construction of Service Exploration Model in Pervasive Computing Environments
暂无分享,去创建一个
[1] Ben Y. Zhao,et al. An Architecture for Secure Wide-Area Service Discovery , 2002, Wirel. Networks.
[2] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[3] Michael Nidd,et al. Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..
[4] S. Ungar,et al. Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).
[5] Lionel M. Ni,et al. A private, secure, and user-centric information exposure model for service discovery protocols , 2006 .
[6] Martín Abadi,et al. Private authentication , 2004, Theor. Comput. Sci..
[7] Paolo Traverso,et al. Service Discovery in Pervasive Computing Environments , 2009 .
[8] Hans Scholten,et al. Home Network Security , 2008, Seventh International Conference on Networking (icn 2008).
[9] B. Noble,et al. On certain integrals of Lipschitz-Hankel type involving products of bessel functions , 1955, Philosophical Transactions of the Royal Society of London. Series A, Mathematical and Physical Sciences.
[10] T. Nixon,et al. Home networking with Universal Plug and Play , 2001 .
[11] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[12] Armando Fox,et al. System Software for Ubiquitous Computing , 2022 .
[13] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[14] Matt Blaze,et al. Rights Amplification in Master-Keyed Mechanical Locks , 2003, IEEE Secur. Priv..