An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments
暂无分享,去创建一个
[1] Lionel M. Ni,et al. Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[2] Mahadev Satyanarayanan,et al. Fundamental challenges in mobile computing , 1996, PODC '96.
[3] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[4] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[5] Lionel M. Ni,et al. PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[6] Celeste Campo,et al. SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .
[7] T. Nixon,et al. Home networking with Universal Plug and Play , 2001 .
[8] Frank Stajano,et al. The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.
[9] Philip Zimmermann,et al. PGP source code and internals , 1995 .
[10] Sheikh Iqbal Ahamed,et al. ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications , 2007, Int. J. Netw. Secur..
[11] Sheikh Iqbal Ahamed,et al. PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business , 2005, COMPSAC.
[12] Djamshid Tavangarian,et al. Security architecture for service-based mobile environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[13] Lionel M. Ni,et al. Expose or not? A progressive exposure approach for service discovery in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[14] Sheikh Iqbal Ahamed,et al. MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[15] Jianping Hu,et al. A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[16] Armando Fox,et al. System Software for Ubiquitous Computing , 2022 .
[17] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[18] Sheikh Iqbal Ahamed,et al. Knowledge Usability and its Characteristics for Pervasive Computing , 2005, PSC.
[19] Mark Weiser,et al. Some Computer Science Problems in Ubiquitous Computing , 1993 .
[20] Jin Nakazawa,et al. Improving security for ubiquitous campus applications , 2004, 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops..
[21] Michael Nidd,et al. Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..
[22] Hari Balakrishnan,et al. The design and implementation of an intentional naming system , 1999, SOSP.
[23] Sheikh Iqbal Ahamed,et al. SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[24] David R. Karger,et al. INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.
[25] Anand R. Tripathi,et al. Context-based secure resource access in pervasive computing environments , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.