메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 225-234

Expose or not? A progressive exposure approach for service discovery in pervasive computing environments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTABILITY AND DECIDABILITY; COMPUTER PRIVACY; INFORMATION ANALYSIS; QUALITY OF SERVICE;

EID: 30344471587     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (21)
  • 1
    • 0010602271 scopus 로고    scopus 로고
    • System Software for Ubiquitous Computing
    • January-March
    • T. Kindberg and A. Fox, "System Software for Ubiquitous Computing," IEEE Pervasive Computing, January-March, pp. 70-81, 2002.
    • (2002) IEEE Pervasive Computing , pp. 70-81
    • Kindberg, T.1    Fox, A.2
  • 4
    • 0035428326 scopus 로고    scopus 로고
    • Service discovery in DEAPspace
    • August
    • M. Nidd, "Service Discovery in DEAPspace," IEEE Personal Communications, August, pp. 39-45, 2001.
    • (2001) IEEE Personal Communications , pp. 39-45
    • Nidd, M.1
  • 7
    • 0842304770 scopus 로고    scopus 로고
    • Home network security
    • C. Ellison, "Home Network Security," Intel Technology Journal, vol. 06, Issue 04, pp. 37-48, 2002.
    • (2002) Intel Technology Journal , vol.6 , Issue.4 , pp. 37-48
    • Ellison, C.1
  • 8
    • 20844461994 scopus 로고    scopus 로고
    • The Salutation Consortium Inc.
    • Salutation Consortium, "Salutation Architecture Specification," The Salutation Consortium Inc.available at ftp://ftp.salutation.org/salute/ sa20e1a21.ps, 1999.
    • (1999) Salutation Architecture Specification
  • 11
    • 36248963594 scopus 로고    scopus 로고
    • Bluetooth SIG Security Expert Group, "Bluetooth Security White Paper," available at http://gruuper.ieee.Org/groups/1451/5/ Cumparison%20of%20PHY/Bluetooth_24Security_Paper.pdf, 2002.
    • (2002) Bluetooth Security White Paper
  • 15
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • presented at Oakland, CA
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," presented at 2003 IEEE Symposium on Security and Privacy, Oakland, CA, 2003.
    • (2003) 2003 IEEE Symposium on Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 16
    • 19944417112 scopus 로고    scopus 로고
    • Port knocking: Network authentication across closed ports
    • M. Krzywinski, "Port Knocking: Network Authentication Across Closed Ports," in SysAdmin Magazine, vol. 12, 2003, pp. 12-17.
    • (2003) SysAdmin Magazine , vol.12 , pp. 12-17
    • Krzywinski, M.1
  • 17
    • 3042844145 scopus 로고    scopus 로고
    • Photographic authentication through untrusted terminals
    • January-March
    • T. Pering, M. Sundar, J. Light, and R. Want, "Photographic Authentication through Untrusted Terminals," IEEE Pervasive Computing, January-March, pp. 30-36, 2003.
    • (2003) IEEE Pervasive Computing , pp. 30-36
    • Pering, T.1    Sundar, M.2    Light, J.3    Want, R.4
  • 18
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Advances in Cryptology-CRYPTO '96, presented at
    • M. Bellare, R. Canettiy, and H. Krawczykz, "Keying Hash Functions for Message Authentication," presented at Advances in Cryptology-CRYPTO '96 (LNCS 1109), 1996.
    • (1996) LNCS , vol.1109
    • Bellare, M.1    Canettiy, R.2    Krawczykz, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.