Amapola: A Simple Infrastructure for Ubiquitous Computing
暂无分享,去创建一个
Joan Borrell | Guillermo Navarro | Jose A. Ortega-Ruiz | Joaquín García | Joan Ametller | J. Peñalver | Joaquín García | J. A. Ortega-Ruiz | J. Borrell | G. Navarro | Joan Ametller | J. Peñalver
[1] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[2] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[3] Sun Meifeng,et al. KeyNote Trust Management System , 2002 .
[4] Jeff Hodges,et al. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .
[5] Carl M. Ellison,et al. Public-key support for group collaboration , 2003, TSEC.
[6] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[7] Albrecht Schmidt,et al. Building intelligent environments with Smart-Its , 2004, IEEE Computer Graphics and Applications.
[8] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[9] Christopher G. Lasater,et al. Design Patterns , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[10] Carl M. Ellison. Improvements on Conventional PKI Wisdom , 2002 .
[11] Frank Stajano,et al. The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.
[12] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[13] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[14] Carl M. Ellison. 1st Annual PKI Research Workshop---Proceedings , 2002 .
[15] Bruce Christianson,et al. Revised Papers from the 9th International Workshop on Security Protocols , 2000 .
[16] William C. Mann,et al. The Gator Tech Smart House: a programmable pervasive space , 2005, Computer.
[17] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.