Authentication for pervasive computing
Main Authors: | Creese, S, Goldsmith, M, Roscoe, B, Zakiuddin, I |
---|---|
Format: | Conference item |
Published: |
Springer Berlin/Heidelberg
2004
|
Similar Items
-
Authentication in pervasive computing
by: Roscoe, A, et al.
Published: (2003) -
Exploiting empirical engagement in authentication protocol design
by: Creese, S, et al.
Published: (2005) -
Exploiting Empirical Engagement in Authentication Protocol Design
by: Creese, S, et al.
Published: (2005) -
Exploiting Empirical Engagement in Authentication Protocol Design
by: Creese, S, et al.
Published: (2005) -
Security properties and mechanisms in human−centric computing
by: Creese, S, et al.
Published: (2004)