Towards secure resource sharing for impromptu collaboration in pervasive computing
暂无分享,去创建一个
[1] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[2] Jean Bacon,et al. Toward open, secure, widely distributed services , 2002, CACM.
[3] Torsten Braun,et al. Secure mobile IP communication , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.
[4] Timothy W. Finin,et al. Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Timothy W. Finin,et al. Moving from Security to Distributed Trust in Ubiquitous Computing Environments , 2001 .
[7] Dongwan Shin,et al. Visual Device identification for Security Services in Ad-Hoc Wireless Networks , 2005, New Trends in Computer Networks.
[8] Markus Lorch,et al. A new security model for collaborative environments , 2003 .
[9] M. Parashar,et al. Context-aware Dynamic Access Control for Pervasive Applications , 2004 .
[10] William R. Claycomb,et al. Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing , 2006, 2006 ACS/IEEE International Conference on Pervasive Services.
[11] Harry Chen,et al. Centaurus: a framework for intelligent services in a mobile environment , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.
[12] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[13] Robert A. Ghanea-Hercock. Phobos: An Agent-Based User Authentication System , 2003, IEEE Intell. Syst..
[14] Gerd Kortuem,et al. When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[15] Peter Steenkiste,et al. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[16] Emil C. Lupu,et al. Towards flexible credential verification in mobile ad-hoc networks , 2002, POMC '02.
[17] Tim Kindberg,et al. An authorization infrastructure for nomadic computing , 2002, SACMAT '02.
[18] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .