Expose or not? A progressive exposure approach for service discovery in pervasive computing environments
暂无分享,去创建一个
[1] Michael Nidd,et al. Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..
[2] Hari Balakrishnan,et al. The design and implementation of an intentional naming system , 1999, SOSP.
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] Sheldon M. Ross,et al. Introduction to Probability Models, Eighth Edition , 1972 .
[5] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[6] S. Ungar,et al. Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).
[7] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[8] Marianne Winslett,et al. A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Sheldon M. Ross,et al. Introduction to probability models , 1975 .
[10] J. Rice. Mathematical Statistics and Data Analysis , 1988 .
[11] Charles E. Perkins,et al. Service Location Protocol, Version 2 , 1999, RFC.
[12] Lionel M. Ni,et al. PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[13] Roy Want,et al. Photographic Authentication through Untrusted Terminals , 2003, IEEE Pervasive Comput..
[14] David R. Karger,et al. INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.
[15] Armando Fox,et al. System Software for Ubiquitous Computing , 2022 .
[16] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[17] Matt W. Mutka,et al. Classification of Service Discovery in Pervasive Computing Environments , 2003 .