共 50 条
- [2] Practical deniable authentication for pervasive computing environments [J]. Wireless Networks, 2018, 24 : 139 - 149
- [4] The master key: A private authentication approach for pervasive computing environments [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
- [5] Authentication for pervasive computing [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
- [6] Fair authentication in pervasive computing [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
- [7] An authentication protocol for pervasive computing [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
- [10] Hierarchical trustworthy authentication for pervasive computing [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 87 - +