共 50 条
- [1] Practical deniable authentication for pervasive computing environments [J]. Wireless Networks, 2018, 24 : 139 - 149
- [2] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83
- [3] Active Authentication for pervasive computing environments [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
- [4] The master key: A private authentication approach for pervasive computing environments [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
- [5] A Practical Approach to Partition Applications in Pervasive Computing Environments [J]. 10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 74 - 81
- [6] Authentication for pervasive computing [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
- [7] Fair authentication in pervasive computing [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
- [8] An authentication protocol for pervasive computing [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563