共 50 条
- [1] Security and privacy analysis of RFID authentication protocol for ubiquitous computing [J]. PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
- [2] Security and privacy in ubiquitous computing [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
- [3] Survey of Ubiquitous Computing Security [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
- [4] The security challenges of ubiquitous computing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
- [5] Security policies and trust in ubiquitous computing [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
- [6] Special issue on security in ubiquitous computing [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
- [7] Small worlds and the security of ubiquitous computing [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597
- [9] Security for ubiquitous computing: Problems and proposed solution [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 110 - 113