Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments
暂无分享,去创建一个
Pascal Lorenz | Benchaa Djellali | Kheira Belarbi | Abdallah Chouarfia | P. Lorenz | Abdallah Chouarfia | Benchaa Djellali | Kheira Belarbi
[1] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[2] Syed Salar Hussain Naqvi. Architecture de sécurité pour les grands systèmes, ouverts, répartis et hétérogènes , 2005 .
[3] Michael Koch,et al. Ubiquitous Computing , 2001, CSCW-Kompendium.
[4] Nei Kato,et al. Toward intelligent machine-to-machine communications in smart grid , 2011, IEEE Communications Magazine.
[5] Jong-Wook Han,et al. Intelligent Pervasive Network Authentication: S/Key Based Device Authentication , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[6] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[7] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[8] Chan Yeob Yeun,et al. Security for emerging ubiquitous networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[9] Pascal Lorenz,et al. User authentication scheme preserving anonymity for ubiquitous devices , 2015, Secur. Commun. Networks.
[10] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[11] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[12] Chris J. Mitchell,et al. The personal CA – PKI for a Personal Area Network , 2003 .
[13] Roy H. Campbell,et al. Towards Security and Privacy for Pervasive Computing , 2002, ISSS.
[14] Saber Zrelli,et al. XKDCP: An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations , 2013, J. Networks.
[15] Jeffrey D. Case,et al. Introduction to Version 3 of the Internet-standard Network Management Framework , 1999, RFC.
[16] Jon Crowcroft,et al. Ticket based service access for the mobile user , 1997, MobiCom '97.
[17] Ayaz Hassan Moon,et al. Authenticated key exchange protocol for Wireless Sensor Networks , 2016 .
[18] Nei Kato,et al. A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.
[19] Jong Wook Han,et al. Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks , 2006, EUC.
[20] Jae-Cheol Ryou,et al. A Trusted Key Management Scheme for Digital Rights Management , 2005 .
[21] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[22] Pascal Lorenz,et al. Security Model for Pervasive Multimedia Environment , 2014 .
[23] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[24] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[25] Jongpil Jeong,et al. Secure User Authentication Mechanism in Digital Home Network Environments , 2006, EUC.
[26] Jim Boyle,et al. Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .
[27] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[28] Timothy W. Finin,et al. Vigil: Enforcing Security in Ubiquitous Environments , 2002 .