共 50 条
- [41] The master key: A private authentication approach for pervasive computing environments [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
- [42] Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 55 - 59
- [43] Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (09): : 101 - 105
- [45] Adaptation in pervasive computing environments: A multi-agent approach [J]. 2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 175 - 176
- [46] Trust-based security in pervasive computing environments [J]. COMPUTER, 2001, 34 (12) : 154 - 157
- [48] AGAPE: a location-aware group membership middleware for pervasive computing environments [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1185 - 1192
- [49] Research on Spatial Location Unit Distribution Model in Pervasive Computing [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT UBIQUITOUS COMPUTING AND EDUCATION, 2009, : 311 - 314
- [50] Research on Spatial Location Unit Distribution Model in Pervasive Computing [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 621 - 625