-
1
-
-
30344461266
-
Service Discovery in Pervasive Computing Environments
-
F. Zhu, M. Mutka, and L. Ni, "Service Discovery in Pervasive Computing Environments," IEEE Pervasive Computing, vol. 4, pp. 81-90, 2005.
-
(2005)
IEEE Pervasive Computing
, vol.4
, pp. 81-90
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
2
-
-
35348856820
-
-
Sun Microsystems, Jini Technology Core Platform Specification, http://wwws.sun.com/software/jini/specs/, June 2003.
-
Sun Microsystems, Jini Technology Core Platform Specification, http://wwws.sun.com/software/jini/specs/, June 2003.
-
-
-
-
3
-
-
20844461994
-
-
Salutation Consortium
-
Salutation Consortium, Salutation Architecture Specification, ftp://ftp.salutation.org/salute/sa20e1a21.ps, 1999.
-
(1999)
Salutation Architecture Specification
-
-
-
5
-
-
35348866712
-
Bluetooth Security
-
white paper, Bluetooth SIG Security Expert Group
-
"Bluetooth Security," white paper, Bluetooth SIG Security Expert Group, http://grouper.ieee.org/groups/1451/5/Comparison%20of%20PHY/ Bluetooth_24Security_Paper.pdf, 2002.
-
(2002)
-
-
-
6
-
-
35048863967
-
-
Intel Co, Oct
-
C. Ellison, UPnP Security Ceremonies V1.0, Intel Co., http:// www.upnp.org/download/standardizeddcps/ UPnPSecurityCeremonies_1_0secure.pdf, Oct. 2003.
-
(2003)
UPnP Security Ceremonies V1.0
-
-
Ellison, C.1
-
7
-
-
0842304770
-
Home Network Security
-
C. Ellison, "Home Network Security," Intel Technology J., vol. 6, pp. 37-48, 2002.
-
(2002)
Intel Technology J
, vol.6
, pp. 37-48
-
-
Ellison, C.1
-
8
-
-
85094635733
-
An Architecture for a Secure Service Discovery Service
-
S. Czerwinski, B.Y. Zhao, T. Hodes, A. Joseph, and R. Katz, "An Architecture for a Secure Service Discovery Service," Proc. MobiCom 1999.
-
(1999)
Proc. MobiCom
-
-
Czerwinski, S.1
Zhao, B.Y.2
Hodes, T.3
Joseph, A.4
Katz, R.5
-
9
-
-
33644657572
-
A Private, Secure and User-Centric Information Exposure Model for Service Discovery Protocols
-
F. Zhu, M. Mutka, and L. Ni, "A Private, Secure and User-Centric Information Exposure Model for Service Discovery Protocols," IEEE Trans. Mobile Computing, vol. 5, pp. 418-429, 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, pp. 418-429
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
10
-
-
0014814325
-
Space/Time Trade-Offs in Hash Coding with Allowable Errors
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, pp. 422-426, 1970.
-
(1970)
Comm. ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.1
-
12
-
-
0038148412
-
A Unified Scheme for Resource Protection in Automated Trust Negotiation
-
T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
13
-
-
0036871183
-
Negotiating Trust on the Web
-
M. Winslett, T. Yu, K.E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust on the Web," IEEE Internet Computing, pp. 30-37, 2002.
-
(2002)
IEEE Internet Computing
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
16
-
-
19944417112
-
Port Knocking: Network Authentication across Closed Ports
-
M. Krzywinski, "Port Knocking: Network Authentication across Closed Ports," SysAdmin Magazine, vol. 12, pp. 12-17, 2003.
-
(2003)
SysAdmin Magazine
, vol.12
, pp. 12-17
-
-
Krzywinski, M.1
-
17
-
-
3042844145
-
Photographic Authentication through Untrusted Terminals
-
T. Pering, M. Sundar, J. Light, and R. Want, "Photographic Authentication through Untrusted Terminals," IEEE Pervasive Computing, pp. 30-36, 2003.
-
(2003)
IEEE Pervasive Computing
, pp. 30-36
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
19
-
-
33749005411
-
Quantitative Evaluation of Unlinkable ID Matching Schemes
-
Y. Nohara, S. Inoue, K. Baba, and H. Yasuma, "Quantitative Evaluation of Unlinkable ID Matching Schemes," Proc. ACM Workshop Privacy in the Electronic Sec. (WPES '05), 2005.
-
(2005)
Proc. ACM Workshop Privacy in the Electronic Sec. (WPES '05)
-
-
Nohara, Y.1
Inoue, S.2
Baba, K.3
Yasuma, H.4
-
20
-
-
14844293432
-
Cryptographic Approach to 'Privacy-Friendly' Tags
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic Approach to 'Privacy-Friendly' Tags," RFID Privacy Workshop, Massachusetts Inst. of Technology, 2003.
-
(2003)
RFID Privacy Workshop, Massachusetts Inst. of Technology
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
21
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
S.A. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Proc. First Int'l Conf. Security in Pervasive Computing (SPC '03), 2003.
-
(2003)
Proc. First Int'l Conf. Security in Pervasive Computing (SPC '03)
-
-
Weis, S.A.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|