Skip to content
VuFind
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Sámegiella
Монгол
Language
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Authentication in pervasive co...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Permanent link
Authentication in pervasive computing
Bibliographic Details
Main Authors:
Roscoe, A
,
Creese, S
,
Goldsmith, M
,
I.Zakiuddin
Format:
Conference item
Published:
LNCS
2003
Holdings
Description
Similar Items
Staff View
Similar Items
Authentication for pervasive computing
by: Creese, S, et al.
Published: (2004)
The attacker in ubiquitous computing environments: formalising the threat model
by: Roscoe, A, et al.
Published: (2003)
Security properties and mechanisms in human−centric computing
by: Creese, S, et al.
Published: (2004)
Exploiting empirical engagement in authentication protocol design
by: Creese, S, et al.
Published: (2005)
Exploiting Empirical Engagement in Authentication Protocol Design
by: Creese, S, et al.
Published: (2005)