메뉴 건너뛰기




Volumn 18, Issue 11, 2007, Pages 1565-1577

Private and secure service discovery via progressive and probabilistic exposure

Author keywords

Authentication; Pervasive computing; Privacy; Probabilistic; Security

Indexed keywords

AUTHENTICATION; MESSAGE PASSING; PERSONAL DIGITAL ASSISTANTS; PROBLEM SOLVING; UBIQUITOUS COMPUTING;

EID: 35348820605     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2007.1075     Document Type: Article
Times cited : (24)

References (24)
  • 1
    • 30344461266 scopus 로고    scopus 로고
    • Service Discovery in Pervasive Computing Environments
    • F. Zhu, M. Mutka, and L. Ni, "Service Discovery in Pervasive Computing Environments," IEEE Pervasive Computing, vol. 4, pp. 81-90, 2005.
    • (2005) IEEE Pervasive Computing , vol.4 , pp. 81-90
    • Zhu, F.1    Mutka, M.2    Ni, L.3
  • 2
    • 35348856820 scopus 로고    scopus 로고
    • Sun Microsystems, Jini Technology Core Platform Specification, http://wwws.sun.com/software/jini/specs/, June 2003.
    • Sun Microsystems, Jini Technology Core Platform Specification, http://wwws.sun.com/software/jini/specs/, June 2003.
  • 3
    • 20844461994 scopus 로고    scopus 로고
    • Salutation Consortium
    • Salutation Consortium, Salutation Architecture Specification, ftp://ftp.salutation.org/salute/sa20e1a21.ps, 1999.
    • (1999) Salutation Architecture Specification
  • 5
    • 35348866712 scopus 로고    scopus 로고
    • Bluetooth Security
    • white paper, Bluetooth SIG Security Expert Group
    • "Bluetooth Security," white paper, Bluetooth SIG Security Expert Group, http://grouper.ieee.org/groups/1451/5/Comparison%20of%20PHY/ Bluetooth_24Security_Paper.pdf, 2002.
    • (2002)
  • 6
    • 35048863967 scopus 로고    scopus 로고
    • Intel Co, Oct
    • C. Ellison, UPnP Security Ceremonies V1.0, Intel Co., http:// www.upnp.org/download/standardizeddcps/ UPnPSecurityCeremonies_1_0secure.pdf, Oct. 2003.
    • (2003) UPnP Security Ceremonies V1.0
    • Ellison, C.1
  • 7
    • 0842304770 scopus 로고    scopus 로고
    • Home Network Security
    • C. Ellison, "Home Network Security," Intel Technology J., vol. 6, pp. 37-48, 2002.
    • (2002) Intel Technology J , vol.6 , pp. 37-48
    • Ellison, C.1
  • 9
    • 33644657572 scopus 로고    scopus 로고
    • A Private, Secure and User-Centric Information Exposure Model for Service Discovery Protocols
    • F. Zhu, M. Mutka, and L. Ni, "A Private, Secure and User-Centric Information Exposure Model for Service Discovery Protocols," IEEE Trans. Mobile Computing, vol. 5, pp. 418-429, 2006.
    • (2006) IEEE Trans. Mobile Computing , vol.5 , pp. 418-429
    • Zhu, F.1    Mutka, M.2    Ni, L.3
  • 10
    • 0014814325 scopus 로고
    • Space/Time Trade-Offs in Hash Coding with Allowable Errors
    • B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, pp. 422-426, 1970.
    • (1970) Comm. ACM , vol.13 , pp. 422-426
    • Bloom, B.1
  • 12
    • 0038148412 scopus 로고    scopus 로고
    • A Unified Scheme for Resource Protection in Automated Trust Negotiation
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 16
    • 19944417112 scopus 로고    scopus 로고
    • Port Knocking: Network Authentication across Closed Ports
    • M. Krzywinski, "Port Knocking: Network Authentication across Closed Ports," SysAdmin Magazine, vol. 12, pp. 12-17, 2003.
    • (2003) SysAdmin Magazine , vol.12 , pp. 12-17
    • Krzywinski, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.