共 50 条
- [41] Trustworthy pervasive computing: The hard security problems SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 117 - 121
- [42] Security Access Model in Pervasive Computing Environment Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
- [45] The importance of high assurance security in pervasive computing SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 9 - 9
- [48] It's no secret Measuring the security and reliability of authentication via 'secret' questions PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 375 - 390
- [49] An Anonymous Lightweight Authentication Scheme with Scalability for Trustworthy Pervasive Social Networking Ogundoyin, Sunday Oyinlola (honsybee@yahoo.com), 1600, Taylor and Francis Ltd. (01): : 3 - 4
- [50] The master key: A private authentication approach for pervasive computing environments PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +