共 50 条
- [2] Fair authentication in pervasive computing SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
- [3] An authentication protocol for pervasive computing PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
- [4] Hierarchical trustworthy authentication for pervasive computing 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 87 - +
- [6] Efficient Authentication for Mobile and Pervasive Computing INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 186 - 202
- [7] Active Authentication for pervasive computing environments SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
- [8] Research of Pervasive Computing THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 183 - 185
- [10] Practical deniable authentication for pervasive computing environments Wireless Networks, 2018, 24 : 139 - 149