A Context-Aware Authentication Approach Based on Behavioral Definitions
暂无分享,去创建一个
Michael Anthony Bauer | Mario A. R. Dantas | Miriam A. M. Capretz | Iara Augustin | Cristiano C. da Rocha | João Carlos D. Lima | Matheus Viera
[1] B. Sathish Babu,et al. A Dynamic Authentication Scheme for Mobile Transactions , 2009, Int. J. Netw. Secur..
[2] Gerard Salton,et al. Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .
[3] Lorna Uden,et al. Activity theory for designing mobile learning , 2007, Int. J. Mob. Learn. Organisation.
[4] Sandeep K. Shukla,et al. A cross-layer approach for power-performance optimization in distributed mobile systems , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[5] Tom Carey,et al. Human-computer interaction , 1994 .
[6] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[7] Massoud Pedram,et al. Extending the lifetime of a network of battery-powered mobile devices by remote processing: a Markovian decision-based approach , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[8] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[9] Jadwiga Indulska,et al. A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..
[10] Michael Anthony Bauer,et al. Toward Reducing Query Response Time for Mobile Emergency Assistance Applications through a Ontology-based Semantic Cache Model , 2009, IKE.
[11] Diane J. Cook,et al. Human Activity Recognition and Pattern Discovery , 2010, IEEE Pervasive Computing.
[12] Ignas G. Niemegeers,et al. Predicting mobility events on personal devices , 2010, Pervasive Mob. Comput..
[13] Anders Kofod-Petersen,et al. Using Activity Theory to Model Context Awareness: A Qualitative Case Study , 2006, FLAIRS.
[14] Gleneesha M. Johnson. Towards shrink-wrapped security: A taxonomy of security-relevant context , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[15] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[16] Siméon-Denis Poisson. Recherches sur la probabilité des jugements en matière criminelle et en matiére civile, précédées des règles générales du calcul des probabilités , 1837 .