Skip to content
VuFind
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Sámegiella
Монгол
Language
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
The attacker in ubiquitous com...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Permanent link
The attacker in ubiquitous computing environments: formalising the threat model
Bibliographic Details
Main Authors:
Roscoe, A
,
Creese, S
,
Goldsmith, M
,
I.Zakiuddin
Format:
Conference item
Published:
2003
Holdings
Description
Similar Items
Staff View
Description
Summary:
Similar Items
Authentication in pervasive computing
by: Roscoe, A, et al.
Published: (2003)
Formalising policies for insider-threat detection: A tripwire grammar
by: Agrafiotis, I, et al.
Published: (2017)
Authentication for pervasive computing
by: Creese, S, et al.
Published: (2004)
Security properties and mechanisms in human−centric computing
by: Creese, S, et al.
Published: (2004)
Research directions for trust and security in human−centric computing
by: Roscoe, A, et al.
Published: (2004)