Authentication in pervasive computing
Principais autores: | Roscoe, A, Creese, S, Goldsmith, M, I.Zakiuddin |
---|---|
Formato: | Conference item |
Publicado em: |
LNCS
2003
|
Registros relacionados
-
Authentication for pervasive computing
por: Creese, S, et al.
Publicado em: (2004) -
The attacker in ubiquitous computing environments: formalising the threat model
por: Roscoe, A, et al.
Publicado em: (2003) -
Security properties and mechanisms in human−centric computing
por: Creese, S, et al.
Publicado em: (2004) -
Research directions for trust and security in human−centric computing
por: Roscoe, A, et al.
Publicado em: (2004) -
Exploiting empirical engagement in authentication protocol design
por: Creese, S, et al.
Publicado em: (2005)