-
1
-
-
34447127497
-
A pervasive trust management model for dynamic open environments
-
F. Almenez, A. Marin, C. Campo, and C. G. R. A Pervasive Trust Management Model for Dynamic Open Environments. In First Workshop on Pervasive Security and Trust at MobiQuitous 2004, Boston, USA., 2004.
-
(2004)
First Workshop on Pervasive Security and Trust at MobiQuitous 2004, Boston, USA
-
-
Almenez, F.1
Marin, A.2
Campo, C.3
R., C.G.4
-
2
-
-
26444566693
-
A comparison of service discovery protocols and implementation of the service location protocol
-
Twente, Netherlands, Sept.
-
C. Bettstetter and C. Renner. A Comparison of Service Discovery Protocols and Implementation of the Service Location Protocol. In Proc. EUNICE Open European Summer School, Twente, Netherlands, Sept. 2000.
-
(2000)
Proc. EUNICE Open European Summer School
-
-
Bettstetter, C.1
Renner, C.2
-
3
-
-
33646775683
-
PDF and GSDL: A new service discovery middleware to support spontaneous interactions in pervasive systems
-
C. Campo, M. Muoz, J. Perea, A. Marin, and C. Garcia-Rubio. PDF and GSDL: a new Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems. In PerCom 2005 Workshops. Third IEEE International Conference on 08-12 March 2005, 2005.
-
(2005)
PerCom 2005 Workshops. Third IEEE International Conference on 08-12 March 2005
-
-
Campo, C.1
Muoz, M.2
Perea, J.3
Marin, A.4
Garcia-Rubio, C.5
-
5
-
-
2342658301
-
Service location protocol, 1999. Version 2
-
IETF Internet Draft
-
E. Guttmann, C. Perkins, J. Veizades, and M. Day. Service Location Protocol, 1999. Version 2. IETF Internet Draft, RFC 2608.
-
RFC
, vol.2608
-
-
Guttmann, E.1
Perkins, C.2
Veizades, J.3
Day, M.4
-
6
-
-
33750950171
-
-
S. M. Inc. Jini Network Technology, Technical report, Sun Microsystems Inc
-
S. M. Inc. Jini Network Technology, An Executive Overview. Technical report, Sun Microsystems Inc, 2001.
-
(2001)
An Executive Overview
-
-
-
9
-
-
33745899100
-
Group rekeying algorithm using pseudo-random functions and modular reduction
-
Pegueroles, Wang-Bin, Soriano, and Rico-Novella. Group Rekeying Algorithm using Pseudo-Random Functions and Modular Reduction. Lecture Notes in Computer Science, 3032:875-882, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3032
, pp. 875-882
-
-
Pegueroles1
Wang-Bin2
Soriano3
Rico-Novella4
-
10
-
-
33750947023
-
-
Technical report, Grupo de Informatica e Automacao, Universidade Federal de Rio de Janeiro
-
A. Pires and O. Duarte. Seguranca em Localizacao de Servicos. Technical report, Grupo de Informatica e Automacao, Universidade Federal de Rio de Janeiro, 2003.
-
(2003)
Seguranca em Localizacao de Servicos
-
-
Pires, A.1
Duarte, O.2
-
14
-
-
77953838402
-
Cracking the bluetooth PIN
-
Seattle, WA
-
Y. Shaked and A. Wool. Cracking the Bluetooth PIN. In 3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), pages 39-50, Seattle, WA., 2005.
-
(2005)
3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys)
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
15
-
-
33750935735
-
Some notes on security in the Service Location Protocol version 2 (SLPv2
-
M. Vettorello, C. Bettstetter, and C. Schwingenschlgl. Some notes on Security in the Service Location Protocol Version 2 (SLPv2. In Workshop on Ad hoc Communications, in conjunction with 7th European Conference on Computer Supported Cooperative Work (ECSCW'01), (Bonn, Germany), 2001.
-
(2001)
Workshop on Ad Hoc Communications, in Conjunction with 7th European Conference on Computer Supported Cooperative Work (ECSCW'01), (Bonn, Germany)
-
-
Vettorello, M.1
Bettstetter, C.2
Schwingenschlgl, C.3
-
16
-
-
33750965510
-
-
www.bluetooth.org. The official Bluetooth Membership site, 2006.
-
(2006)
-
-
-
17
-
-
33750932226
-
-
www.ubisec.org. Main page of ubisec project, 2006.
-
(2006)
-
-
|