Secure and Private Service Discovery in Pervasive Computing Environments
暂无分享,去创建一个
[1] Michael Nidd,et al. Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..
[2] Raphael C.-W. Phan. Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson , 2009, Cryptologia.
[3] Hari Balakrishnan,et al. The design and implementation of an intentional naming system , 1999, SOSP.
[4] Lionel M. Ni,et al. A private, secure, and user-centric information exposure model for service discovery protocols , 2006 .
[5] Lionel M. Ni,et al. Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[6] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[7] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[8] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[9] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[10] David R. Karger,et al. INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.
[11] T. Nixon,et al. Home networking with Universal Plug and Play , 2001 .
[12] Charles E. Perkins,et al. Service Location Protocol, Version 2 , 1999, RFC.
[13] Lionel M. Ni,et al. Private and Secure Service Discovery via Progressive and Probabilistic Exposure , 2007, IEEE Transactions on Parallel and Distributed Systems.
[14] Lionel M. Ni,et al. Service discovery in pervasive computing environments , 2005, IEEE Pervasive Computing.
[15] Stuart D. Cheshire,et al. Discovering Named Instances of Abstract Services using DNS , 2001 .