共 50 条
- [1] Active Authentication for pervasive computing environments [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
- [3] Practical deniable authentication for pervasive computing environments [J]. Wireless Networks, 2018, 24 : 139 - 149
- [4] Private and Secure Service Discovery via Progressive Approach in Pervasive Computing Environments [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 71 - 77
- [7] Authentication for pervasive computing [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
- [8] A Pervasive Computing Approach in Medical Emergency Environments [J]. 11TH MEDITERRANEAN CONFERENCE ON MEDICAL AND BIOLOGICAL ENGINEERING AND COMPUTING 2007, VOLS 1 AND 2, 2007, 16 (1-2): : 1058 - 1061
- [9] Authentication and key distribution methods in mobile computing environments [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 353 - 356
- [10] Fair authentication in pervasive computing [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143