메뉴 건너뛰기




Volumn 35, Issue SUPPL., 2002, Pages 22-26

The resurrecting duckling: Security issues for ubiquitous computing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; GRAPHICAL USER INTERFACES; PERSONAL COMPUTERS; PUBLIC KEY CRYPTOGRAPHY; REMOTE CONTROL; SECURITY OF DATA; WEB BROWSERS;

EID: 0036999904     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: None     Document Type: Article
Times cited : (93)

References (12)
  • 3
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • Proc. Fifth Security Protocols Workshop, Springer-Verlag, Berlin
    • R.J. Anderson and M.G. Kuhn, "Low Cost Attacks on Tamper Resistant Devices," Proc. Fifth Security Protocols Workshop, Lecture Notes in Computer Science 1361, Springer-Verlag, Berlin, 1998, pp. 125-136.
    • (1998) Lecture Notes in Computer Science , vol.1361 , pp. 125-136
    • Anderson, R.J.1    Kuhn, M.G.2
  • 4
    • 84949953635 scopus 로고    scopus 로고
    • The resurrecting duckling-what next?
    • Proc. Eighth Security Protocols Workshop, Springer-Verlag, Berlin
    • F. Stajano, "The Resurrecting Duckling-What Next?" Proc. Eighth Security Protocols Workshop, Lecture Notes in Computer Science 2133, Springer-Verlag, Berlin, 2001, pp. 204-214.
    • (2001) Lecture Notes in Computer Science , vol.2133 , pp. 204-214
    • Stajano, F.1
  • 8
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • Reston, Va.
    • A. Perrig et al., "Efficient and Secure Source Authentication for Multicast," Proc. Network and Distributed System Security Symp., Internet Society, Reston, Va., 2001; www.isoc.org/isoc/conferences/ndss/01/2001/INDEX.HTM.
    • (2001) Proc. Network and Distributed System Security Symp.
    • Perrig, A.1
  • 10
    • 85084163160 scopus 로고    scopus 로고
    • Compliance defects in public-key cryptography
    • Usenix Assn., Berkeley, Calif.
    • D. Davis, "Compliance Defects in Public-Key Cryptography," Proc. Sixth Usenix Security Symp., Usenix Assn., Berkeley, Calif., 1996, pp. 171-178.
    • (1996) Proc. Sixth Usenix Security Symp. , pp. 171-178
    • Davis, D.1
  • 12
    • 0003204888 scopus 로고    scopus 로고
    • The visible problems of the invisible computer: A skeptical look at information appliances
    • Sept.
    • A. Odlyzko, "The Visible Problems of the Invisible Computer: A Skeptical Look at Information Appliances," First Monday, vol. 4, no. 9, Sept. 1999; www.firstmonday.dk/issues/issue4_9/odlyzko/index.html.
    • (1999) First Monday , vol.4 , Issue.9
    • Odlyzko, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.