Context-aware access to public shared devices
暂无分享,去创建一个
[1] Sandeep K. S. Gupta,et al. Proximity based access control in smart-emergency departments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[2] N. Asokan,et al. Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Jakob E. Bardram,et al. Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing , 2003, UbiComp.
[4] M. Parashar,et al. Context-aware Dynamic Access Control for Pervasive Applications , 2004 .
[5] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Mustaque Ahamad,et al. Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[7] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[8] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[9] M.B. Srivastava,et al. A new light sensing module for Mica motes , 2005, IEEE Sensors, 2005..
[10] M. Srivastava,et al. User Access of Public Shared Devices in Pervasive Computing Environments , 2007, 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability (HCMDSS-MDPnP 2007).
[11] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[12] Brian D. Noble,et al. Zero-interaction authentication , 2002, MobiCom '02.
[13] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.