-
1
-
-
0010602271
-
System Software for Ubiquitous Computing
-
January-March
-
T. Kindberg and A. Fox, "System Software for Ubiquitous Computing," IEEE Pervasive Computing, January-March, pp. 70-81, 2002.
-
(2002)
IEEE Pervasive Computing
, pp. 70-81
-
-
Kindberg, T.1
Fox, A.2
-
2
-
-
0344128050
-
-
Michigan State University, East Lansing MSU-CSE-02-24
-
F. Zhu, M. Mutka, and L. Ni, "Classification of Service Discovery in Pervasive Computing Environments," Michigan State University, East Lansing MSU-CSE-02-24,available at http://www.cse.msu.edu/~zhufeng/ ServiceDiscoverySurvey.pdf, 2002.
-
(2002)
Classification of Service Discovery in Pervasive Computing Environments
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
4
-
-
0035428326
-
Service discovery in DEAPspace
-
August
-
M. Nidd, "Service Discovery in DEAPspace," IEEE Personal Communications, August, pp. 39-45, 2001.
-
(2001)
IEEE Personal Communications
, pp. 39-45
-
-
Nidd, M.1
-
5
-
-
0142244048
-
INS/Twine: A scalable peer-to-peer architecture for intentional resource discovery
-
presented at Zurich, Switzerland
-
M. Balazinska, H. Balakrishnan, and D. Karger, "INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery," presented at Pervasive 2002 -International Conference on Pervasive Computing, Zurich, Switzerland, 2002.
-
(2002)
Pervasive 2002 -International Conference on Pervasive Computing
-
-
Balazinska, M.1
Balakrishnan, H.2
Karger, D.3
-
6
-
-
0001749548
-
The design and implementation of an intentional naming system
-
presented at Kiawah Island, SC
-
W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley, "The design and implementation of an intentional naming system," presented at 17th ACM Symposium on Operating Systems Principles (SOSP '99), Kiawah Island, SC, 1999.
-
(1999)
17th ACM Symposium on Operating Systems Principles (SOSP '99)
-
-
Adjie-Winoto, W.1
Schwartz, E.2
Balakrishnan, H.3
Lilley, J.4
-
7
-
-
0842304770
-
Home network security
-
C. Ellison, "Home Network Security," Intel Technology Journal, vol. 06, Issue 04, pp. 37-48, 2002.
-
(2002)
Intel Technology Journal
, vol.6
, Issue.4
, pp. 37-48
-
-
Ellison, C.1
-
8
-
-
20844461994
-
-
The Salutation Consortium Inc.
-
Salutation Consortium, "Salutation Architecture Specification," The Salutation Consortium Inc.available at ftp://ftp.salutation.org/salute/ sa20e1a21.ps, 1999.
-
(1999)
Salutation Architecture Specification
-
-
-
9
-
-
0004077942
-
-
E. Guttman, C. Perkins, J. Veizades, and M. Day, "Service Location Protocol, Version 2," available at http://www.ietf.org/rfc/rfc2608.txt, 1999.
-
(1999)
Service Location Protocol, Version 2
-
-
Guttman, E.1
Perkins, C.2
Veizades, J.3
Day, M.4
-
11
-
-
36248963594
-
-
Bluetooth SIG Security Expert Group, "Bluetooth Security White Paper," available at http://gruuper.ieee.Org/groups/1451/5/ Cumparison%20of%20PHY/Bluetooth_24Security_Paper.pdf, 2002.
-
(2002)
Bluetooth Security White Paper
-
-
-
12
-
-
85094635733
-
An architecture for a secure service discovery service
-
presented at Seattle, WA
-
S. Czerwinski, B. Y. Zhao, T. Hodes, A. Joseph, and R. Katz, "An Architecture for a Secure Service Discovery Service," presented at Fifth Annual International Conference on Mobile Computing and Networks (MobiCom '99), Seattle, WA, 1999.
-
(1999)
Fifth Annual International Conference on Mobile Computing and Networks (MobiCom '99)
-
-
Czerwinski, S.1
Zhao, B.Y.2
Hodes, T.3
Joseph, A.4
Katz, R.5
-
13
-
-
2642523653
-
Prudentexposure: A private and user-centric service discovery protocol
-
presented at Orlando, Florida
-
F. Zhu, M. Mutka, and L. Ni, "PrudentExposure: A Private and User-centric Service Discovery Protocol," presented at 2nd IEEE Annual Conference on Pervasive Computing and Communications, Orlando, Florida, 2004.
-
(2004)
2nd IEEE Annual Conference on Pervasive Computing and Communications
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
15
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
presented at Oakland, CA
-
T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," presented at 2003 IEEE Symposium on Security and Privacy, Oakland, CA, 2003.
-
(2003)
2003 IEEE Symposium on Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
16
-
-
19944417112
-
Port knocking: Network authentication across closed ports
-
M. Krzywinski, "Port Knocking: Network Authentication Across Closed Ports," in SysAdmin Magazine, vol. 12, 2003, pp. 12-17.
-
(2003)
SysAdmin Magazine
, vol.12
, pp. 12-17
-
-
Krzywinski, M.1
-
17
-
-
3042844145
-
Photographic authentication through untrusted terminals
-
January-March
-
T. Pering, M. Sundar, J. Light, and R. Want, "Photographic Authentication through Untrusted Terminals," IEEE Pervasive Computing, January-March, pp. 30-36, 2003.
-
(2003)
IEEE Pervasive Computing
, pp. 30-36
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
18
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology-CRYPTO '96, presented at
-
M. Bellare, R. Canettiy, and H. Krawczykz, "Keying Hash Functions for Message Authentication," presented at Advances in Cryptology-CRYPTO '96 (LNCS 1109), 1996.
-
(1996)
LNCS
, vol.1109
-
-
Bellare, M.1
Canettiy, R.2
Krawczykz, H.3
|