共 50 条
- [42] Pervasive Computing Secure Application Models Based on Trust Algorithm PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 606 - 609
- [44] Secure location verification using radio broadcast PRINCIPLES OF DISTRIBUTED SYSTEMS, 2005, 3544 : 369 - 383
- [45] Secure localization and location verification in sensor networks MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 278 - 287
- [47] Towards Secure Resource Sharing for Impromptu Collaboration in Pervasive Computing APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 940 - 946
- [48] Verification Requirements for Secure and Reliable Cloud Computing 2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 143 - 150
- [49] Physical Interaction in Pervasive Computing: Formal Modeling, Analysis and Verification INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES (ICPS 2009), 2009, : 133 - 140
- [50] A Framework for Secure Mobile Cloud Computing PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 353 - 363