Authentication in pervasive computing
Главные авторы: | Roscoe, A, Creese, S, Goldsmith, M, I.Zakiuddin |
---|---|
Формат: | Conference item |
Опубликовано: |
LNCS
2003
|
Схожие документы
-
Authentication for pervasive computing
по: Creese, S, и др.
Опубликовано: (2004) -
The attacker in ubiquitous computing environments: formalising the threat model
по: Roscoe, A, и др.
Опубликовано: (2003) -
Security properties and mechanisms in human−centric computing
по: Creese, S, и др.
Опубликовано: (2004) -
Research directions for trust and security in human−centric computing
по: Roscoe, A, и др.
Опубликовано: (2004) -
Exploiting empirical engagement in authentication protocol design
по: Creese, S, и др.
Опубликовано: (2005)