Look Who's Talking - Authenticating Service Access Points
暂无分享,去创建一个
[1] Ronan MacLaverty,et al. Security and reliability challenges in component-based software for consumer devices , 2004, IASTED Conf. on Software Engineering.
[2] Birgit Pfitzmann,et al. Die PERSEUS Systemarchitektur , 2001 .
[3] Sadie Creese,et al. Authentication for Pervasive Computing , 2003, SPC.
[4] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[5] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[6] Mark Weiser. The computer for the 21st century , 1991 .
[7] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[8] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[9] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[10] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[11] Gregory D. Abowd,et al. Ubicomp 2001: Ubiquitous Computing , 2001, Lecture Notes in Computer Science.
[12] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[13] R. W. Peterson,et al. OPTICAL INTERFEROMETRY OF SURFACES , 1991 .