Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
暂无分享,去创建一个
[1] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[2] Brian D. Noble,et al. The case for transient authentication , 2002, EW 10.
[3] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[4] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[5] Michael Beigl,et al. Spatially Aware Local Communication in the RAUM System , 2000, IDMS.
[6] William A. Arbaugh,et al. IEEE 52 Computer , 1985 .
[7] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[8] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[9] Emil C. Lupu,et al. Policy Specification for Programmable Networks , 1999, IWAN.
[10] Lars Erik Holmquist,et al. Supporting group collaboration with interpersonal awareness devices , 1999, Personal Technologies.
[11] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[12] B. Gladman,et al. Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction , 2022 .
[13] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[14] Marc Langheinrich,et al. First Steps Towards an Event-Based Infrastructure for Smart Things , 2000 .
[15] Tim Kindberg,et al. Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[16] Gene Tsudik,et al. Communication-Efficient Group Key Agreement , 2001, SEC.
[17] Albrecht Schmidt,et al. Implicit human computer interaction through context , 2000, Personal Technologies.
[18] Berni Dwan,et al. Smart card security and applications , 1998 .
[19] Michael Kreutzer,et al. Pervasive Privacy with Identity Management , 2002 .
[20] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[21] Markus Straßer,et al. System mechanisms for partial rollback of mobile agent execution , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[22] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[23] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[24] Gregory D. Abowd,et al. The smart floor: a mechanism for natural user identification and tracking , 2000, CHI Extended Abstracts.
[25] Paul Dourish,et al. Awareness and coordination in shared workspaces , 1992, CSCW '92.
[26] Donald A. Norman,et al. The invisible computer , 1998 .
[27] Albrecht Schmidt,et al. Mediacups: experience with design and use of computer-augmented everyday artefacts , 2001, Comput. Networks.
[28] Peter Brown. Context-awareness: some compelling applications , 2000 .
[29] Daniel P. Lopresti,et al. Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices , 2002, USENIX Security Symposium.
[30] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[31] Roy Want,et al. Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.
[32] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[33] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.