Research Directions for Trust and Security in Human-Centric Computing
暂无分享,去创建一个
[1] Colin Boyd,et al. Protocols for Key Establishment and Authentication , 2003 .
[2] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[3] Peter Y. A. Ryan,et al. The modelling and analysis of security protocols: the csp approach , 2000 .
[4] Sadie Creese,et al. Authentication for Pervasive Computing , 2003, SPC.
[5] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[6] Sadie Creese,et al. The attacker in ubiquitous computing environments: formalising the threat model , 2003 .