共 50 条
- [1] Trust-based security architecture for Ubiquitous Computing systems [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 753 - 754
- [3] Trust models in ubiquitous computing [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3781 - 3793
- [4] Security and trust in ubiquitous systems [J]. Annals of Telecommunications, 2021, 76 : 117 - 118
- [5] Security and trust in ubiquitous systems [J]. ANNALS OF TELECOMMUNICATIONS, 2021, 76 (3-4) : 117 - 118
- [6] Security and privacy in ubiquitous computing [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
- [7] Survey of Ubiquitous Computing Security [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
- [8] The security challenges of ubiquitous computing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
- [9] Special issue on security in ubiquitous computing [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
- [10] Small worlds and the security of ubiquitous computing [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597