Authentication in pervasive computing
Prif Awduron: | Roscoe, A, Creese, S, Goldsmith, M, I.Zakiuddin |
---|---|
Fformat: | Conference item |
Cyhoeddwyd: |
LNCS
2003
|
Eitemau Tebyg
-
Authentication for pervasive computing
gan: Creese, S, et al.
Cyhoeddwyd: (2004) -
The attacker in ubiquitous computing environments: formalising the threat model
gan: Roscoe, A, et al.
Cyhoeddwyd: (2003) -
Security properties and mechanisms in human−centric computing
gan: Creese, S, et al.
Cyhoeddwyd: (2004) -
Research directions for trust and security in human−centric computing
gan: Roscoe, A, et al.
Cyhoeddwyd: (2004) -
Exploiting empirical engagement in authentication protocol design
gan: Creese, S, et al.
Cyhoeddwyd: (2005)