Private and secure service discovery via progressive approach in pervasive computing environments
暂无分享,去创建一个
[1] Marianne Winslett,et al. A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] S. Ungar,et al. Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).
[3] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[4] Hans Scholten,et al. Home Network Security , 2008, Seventh International Conference on Networking (icn 2008).
[5] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[6] Lionel M. Ni,et al. A private, secure, and user-centric information exposure model for service discovery protocols , 2006, IEEE Transactions on Mobile Computing.
[7] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[8] Lionel M. Ni,et al. Service discovery in pervasive computing environments , 2005, IEEE Pervasive Computing.
[9] Ninghui Li,et al. Protecting sensitive attributes in automated trust negotiation , 2002, WPES '02.
[10] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[11] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[12] Roy Want,et al. Photographic Authentication through Untrusted Terminals , 2003, IEEE Pervasive Comput..