Authentication in pervasive computing
Auteurs principaux: | Roscoe, A, Creese, S, Goldsmith, M, I.Zakiuddin |
---|---|
Format: | Conference item |
Publié: |
LNCS
2003
|
Documents similaires
-
Authentication for pervasive computing
par: Creese, S, et autres
Publié: (2004) -
The attacker in ubiquitous computing environments: formalising the threat model
par: Roscoe, A, et autres
Publié: (2003) -
Security properties and mechanisms in human−centric computing
par: Creese, S, et autres
Publié: (2004) -
Research directions for trust and security in human−centric computing
par: Roscoe, A, et autres
Publié: (2004) -
Exploiting empirical engagement in authentication protocol design
par: Creese, S, et autres
Publié: (2005)