-
3
-
-
3042581363
-
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
-
San Diego, CA
-
D. Balfanz, D. K. Smelters, P. Stewart, and H. C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," 9th Annual Network and Distributed System Security Symposium, San Diego, CA, 2002.
-
(2002)
9th Annual Network and Distributed System Security Symposium
-
-
Balfanz, D.1
Smelters, D.K.2
Stewart, P.3
Wong, H.C.4
-
4
-
-
0001989185
-
A New Family of Authentication Protocols
-
R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, and R. Needham, "A New Family of Authentication Protocols," Operating Systems Review, 1998.
-
(1998)
Operating Systems Review
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.6
-
5
-
-
24744450314
-
Splendor: A Secure, Private, and Location-aware Service Discovery Protocol Supporting Mobile Services
-
IEEE Computer Society Press, Fort Worth, Texas
-
F. Zhu, M. Mutka, and L. Ni, "Splendor: A Secure, Private, and Location-aware Service Discovery Protocol Supporting Mobile Services," 1st IEEE Annual Conference on Pervasive Computing and Communications,IEEE Computer Society Press, Fort Worth, Texas, 2003.
-
(2003)
1st IEEE Annual Conference on Pervasive Computing and Communications
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
6
-
-
0036041841
-
Proxy-Based Security Protocols in Networked Mobile Devices
-
Madrid, Spain
-
M. Burnside, D. Clarke, T. Mills, S. Devadas, and R. Rivest, "Proxy-Based Security Protocols in Networked Mobile Devices," 17th ACM Symposium on Applied Computing, Madrid, Spain, 2002.
-
(2002)
17th ACM Symposium on Applied Computing
-
-
Burnside, M.1
Clarke, D.2
Mills, T.3
Devadas, S.4
Rivest, R.5
-
7
-
-
2442539759
-
A Privacy Awareness System for Ubiquitous Computing Environments
-
GÖTEBORG, SWEDEN
-
M. Langheinrich, "A Privacy Awareness System for Ubiquitous Computing Environments," UbiComp 2002, GÖTEBORG, SWEDEN, 2002.
-
(2002)
UbiComp 2002
-
-
Langheinrich, M.1
-
8
-
-
0035672220
-
Home Networking with Universal Plug and Play
-
December
-
B. A. Miller, T. Nixon, C. Tai, and M. D. Wood, "Home Networking with Universal Plug and Play," IEEE Communications Magazine, December, 2001, pp. 104-109.
-
(2001)
IEEE Communications Magazine
, pp. 104-109
-
-
Miller, B.A.1
Nixon, T.2
Tai, C.3
Wood, M.D.4
-
9
-
-
0035428326
-
Service Discovery in DEAPspace
-
August
-
M. Nidd, "Service Discovery in DEAPspace," IEEE Personal Communications, August, 2001, pp. 39-45.
-
(2001)
IEEE Personal Communications
, pp. 39-45
-
-
Nidd, M.1
-
10
-
-
20844461994
-
-
June 1
-
"Salutation Architecture Specification," Salutation Consortium, Version 2.0c, June 1, 1999, available at ftp://ftp.salutation.org/salute/sa20ela21.ps.
-
(1999)
Salutation Architecture Specification
-
-
-
11
-
-
0004077942
-
-
RFC2608, June
-
E. Guttman, C. Perkins, J. Veizades, and M. Day, "Service Location Protocol, Version 2," IETF, RFC2608, June 1999, available at http://www.ietf.org/rfc/rfc2608.txt.
-
(1999)
Service Location Protocol, Version 2
-
-
Guttman, E.1
Perkins, C.2
Veizades, J.3
Day, M.4
-
12
-
-
0004345557
-
-
February 22
-
"Specification of the Bluetooth System - Core," Bluetooth SIG, Version 1.1, February 22, 2001, available at http://www.bluetooth.org/docs/Bluetooth_V11_Core_22Feb01.pdf.
-
(2001)
Specification of the Bluetooth System - Core
-
-
-
13
-
-
0344128050
-
-
Michigan State University, East Lansing
-
F. Zhu, M. Mutka, and L. Ni, Classification of Service Discovery in Pervasive Computing Environments, MSU-CSE02-24, Michigan State University, East Lansing, 2002.
-
(2002)
Classification of Service Discovery in Pervasive Computing Environments
, vol.MSU-CSE02-24
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
15
-
-
0004115867
-
-
New Riders
-
S. Lloyd, C. Adams, and S. Kent, Understanding Public-Key Infrastructure: Concept, Standards, and deployment considerations, New Riders, 1999.
-
(1999)
Understanding Public-key Infrastructure: Concept, Standards, and Deployment Considerations
-
-
Lloyd, S.1
Adams, C.2
Kent, S.3
-
17
-
-
0036871183
-
Negotiating Trust on the Web
-
Nov-Dec
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust on the Web," IEEE Internet Computing, Nov-Dec, 2002, pp. 30-37.
-
(2002)
IEEE Internet Computing
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
|