共 50 条
- [1] Security and privacy in ubiquitous computing [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
- [2] The security challenges of ubiquitous computing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
- [3] Security policies and trust in ubiquitous computing [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
- [4] Special issue on security in ubiquitous computing [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
- [5] Small worlds and the security of ubiquitous computing [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597
- [6] SPUC: Security protocol for ubiquitous computing [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 757 - 760
- [8] A survey of application development in ubiquitous computing [J]. Computer Software, 2008, 25 (04) : 121 - 132
- [9] Security for ubiquitous computing: Problems and proposed solution [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 110 - 113