共 50 条
- [21] Protection of privacy in pervasive computing environments [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
- [24] Provably Correct Pervasive Computing Environments [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 160 - +
- [25] A trust framework for pervasive computing environments [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 312 - +
- [26] A Trust Framework for Pervasive Computing Environments [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2222 - 2225
- [27] Agile middleware of pervasive computing environments [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 192 - 197
- [28] Active Authentication for pervasive computing environments [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
- [29] Context management in pervasive computing environments [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
- [30] Olympus: A high-level programming model for pervasive computing environments [J]. Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 7 - 16