Advances in security and multimodality for pervasive computing environments

被引:0
|
作者
Park, Jong Hyuk [1 ]
Hsu, Ching-Hsien [2 ]
Chilamkurti, Naveen [3 ]
Denko, Mieso [4 ]
机构
[1] Seoul Natl Univ Sci & Technol, Seoul, South Korea
[2] Chung Hua Univ, Hsinchu, Taiwan
[3] La Trobe Univ, Melbourne, Vic, Australia
[4] Univ Guelph, Guelph, ON N1G 2W1, Canada
关键词
D O I
10.1007/s11235-011-9646-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
引用
收藏
页码:1341 / 1342
页数:2
相关论文
共 50 条
  • [31] An agent approach to security in pervasive environments
    Kagal, L
    EIGHTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-02)/FOURTEENTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-02), PROCEEDINGS, 2002, : 984 - 984
  • [32] Security in pervasive computing - Calling for new security principles
    Zugenmaier, Alf
    Walter, Thomas
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 96 - +
  • [33] Security for whom? The shifting security assumptions of pervasive computing
    Stajano, F
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 16 - 27
  • [34] Data Security and Privacy Protection in Pervasive Computing Environments J.UCS Special Issue
    Koh, Byoung-Soo
    Denko, Mieso
    Gritzalis, Stefanos
    Hsu, Ching-Hsien
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (05) : 967 - 969
  • [35] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [36] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [37] Protecting Users' Anonymity in Pervasive Computing Environments
    Pareschi, Linda
    Riboni, Daniele
    Bettini, Claudio
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 11 - 19
  • [38] On experiments with a transport protocol for pervasive computing environments
    Avancha, S
    Korolev, V
    Joshi, A
    Finin, T
    Yesha, Y
    COMPUTER NETWORKS, 2002, 40 (04) : 515 - 535
  • [39] A Hybrid CARV Architecture for Pervasive Computing Environments
    Kim, SoonGohn
    Ko, Eung Nam
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 380 - +
  • [40] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149