Authentication in pervasive computing
Autors principals: | Roscoe, A, Creese, S, Goldsmith, M, I.Zakiuddin |
---|---|
Format: | Conference item |
Publicat: |
LNCS
2003
|
Ítems similars
-
Authentication for pervasive computing
per: Creese, S, et al.
Publicat: (2004) -
The attacker in ubiquitous computing environments: formalising the threat model
per: Roscoe, A, et al.
Publicat: (2003) -
Security properties and mechanisms in human−centric computing
per: Creese, S, et al.
Publicat: (2004) -
Research directions for trust and security in human−centric computing
per: Roscoe, A, et al.
Publicat: (2004) -
Exploiting empirical engagement in authentication protocol design
per: Creese, S, et al.
Publicat: (2005)