Authentication in pervasive computing
Main Authors: | Roscoe, A, Creese, S, Goldsmith, M, I.Zakiuddin |
---|---|
Formato: | Conference item |
Publicado: |
LNCS
2003
|
Títulos similares
-
Authentication for pervasive computing
por: Creese, S, et al.
Publicado: (2004) -
The attacker in ubiquitous computing environments: formalising the threat model
por: Roscoe, A, et al.
Publicado: (2003) -
Security properties and mechanisms in human−centric computing
por: Creese, S, et al.
Publicado: (2004) -
Research directions for trust and security in human−centric computing
por: Roscoe, A, et al.
Publicado: (2004) -
Exploiting empirical engagement in authentication protocol design
por: Creese, S, et al.
Publicado: (2005)