SuSSo: Seamless and ubiquitous single sign-on for cloud service continuity across devices
暂无分享,去创建一个
Andrés Marín López | Daniel Díaz Sánchez | Patricia Arias Cabarcos | Florina Almenárez Mendoza | Rosa Sánchez-Guerrero | Florina Almenárez Mendoza | Rosa Sánchez-Guerrero
[1] D. Recordon,et al. The OAuth 2.0 Authorization Protocol: Bearer Tokens draft-ietf-oauth-v2-bearer-10 , 2012 .
[2] Janno von Stülpnagel,et al. Automatic context detection of a mobile user , 2010, 2010 International Conference on Wireless Information Networks and Systems (WINSYS).
[3] Marc Barisch. Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[5] Andrés Marín López,et al. FamTV: An architecture for presence-aware personalized television , 2011, IEEE Transactions on Consumer Electronics.
[6] Christopher Soghoian. An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government , 2010 .
[7] Feng Hao,et al. Password Authenticated Key Exchange by Juggling , 2008, Security Protocols Workshop.
[8] Masanobu Abe,et al. A life log collector integrated with a remote-controller for enabling user centric services , 2009, IEEE Transactions on Consumer Electronics.
[9] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[10] Jeff Hodges,et al. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .
[11] Neco Ventura,et al. A SIP-based web client for HTTP session mobility and multimedia services , 2010, Comput. Commun..
[12] Chien-Chao Tseng,et al. Stateful session handoff for mobile WWW , 2006, Inf. Sci..
[13] Feng Hao,et al. How to Sync with Alice , 2011, Security Protocols Workshop.
[14] Ji-Young Kwak. Ubiquitous Services System Based on SIP , 2007, IEEE Transactions on Consumer Electronics.
[15] Feng Hao,et al. J-PAKE: Authenticated Key Exchange without PKI , 2010, Trans. Comput. Sci..
[16] Min-Xiou Chen,et al. Session mobility of SIP over multiple devices , 2008 .
[17] Andrés Marín López,et al. A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[18] Maja Pantic,et al. Social signal processing: Survey of an emerging domain , 2009, Image Vis. Comput..
[19] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[20] Ian S. Burnett,et al. Application level session hand-off management in a ubiquitous multimedia environment , 2004, e-Business and Telecommunication Networks.
[21] S. Martin,et al. Using context prediction for self-management in ubiquitous computing environments , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..