메뉴 건너뛰기




Volumn 4631 LNCS, Issue , 2007, Pages 295-307

Implementing a multi-hat PDA

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BLUETOOTH; COMPUTER OPERATING SYSTEMS; GRAPHIC METHODS; MOBILE PHONES; SOFTWARE PROTOTYPING;

EID: 38149068982     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77156-2_37     Document Type: Conference Paper
Times cited : (1)

References (13)
  • 4
    • 85030309636 scopus 로고
    • Identification Tokens-or: Solving the Chess Grandmaster Problem
    • Menezes, A.J, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
    • Beth, T., Desmedt, Y.: Identification Tokens-or: Solving the Chess Grandmaster Problem. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 11-15. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 11-15
    • Beth, T.1    Desmedt, Y.2
  • 5
    • 84976295016 scopus 로고
    • Distance Bounding Protocols
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 302-9743. Springer, Heidelberg (1994), http://link.springer-ny.com/link/service/series/0558/papers/0765/ 07650344.pdf
    • (1994) LNCS , vol.765 , pp. 302-9743
    • Brands, S.1    Chaum, D.2
  • 7
    • 24744432328 scopus 로고    scopus 로고
    • Securing The X Window System With SELinux
    • Tech. Rep. 03-006, NAI Labs March
    • Kilpatrick, D., Salamon, W., Vance, C.: Securing The X Window System With SELinux. Tech. Rep. 03-006, NAI Labs (March 2003), http://www.nsa.gov/selinux/ papers/X11_Study.pdf
    • (2003)
    • Kilpatrick, D.1    Salamon, W.2    Vance, C.3
  • 8
    • 2442425355 scopus 로고    scopus 로고
    • Integrating Flexible Support for Security Policies into the Linux Operating System
    • USENIX Association
    • Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: The 2001 USENIX Annual Technical Conference, USENIX Association (2001)
    • (2001) The 2001 USENIX Annual Technical Conference
    • Loscocco, P.1    Smalley, S.2
  • 9
    • 0028763491 scopus 로고
    • Teleporting in an X Window System Environment
    • Richardson, T., Bennett, F., Hopper, A.: Teleporting in an X Window System Environment. IEEE Personal Communications Magazine 1(3), 6-12 (1994), http://www.uk.research.att.com/pub/docs/att/tr.94.4.ps.Z
    • (1994) IEEE Personal Communications Magazine , vol.1 , Issue.3 , pp. 6-12
    • Richardson, T.1    Bennett, F.2    Hopper, A.3
  • 11
    • 38149018234 scopus 로고    scopus 로고
    • Secure Verification of Location Claims
    • Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. CryptoBytes 7(1), 17-29 (2004)
    • (2004) CryptoBytes , vol.7 , Issue.1 , pp. 17-29
    • Sastry, N.1    Shankar, U.2    Wagner, D.3
  • 12
    • 0013413164 scopus 로고    scopus 로고
    • John Wiley and Sons, Chichester
    • Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002), http://www-lce.eng.cam.ac.uk/fms27/secubicomp/
    • (2002) Security for Ubiquitous Computing
    • Stajano, F.1
  • 13
    • 38149015864 scopus 로고    scopus 로고
    • Stajano, F.: One user, many hats; and, sometimes, no hat-towards a secure yet usable PDA. In: The Twelfth International Workshop on Security Protocols, http://www-lce.eng.cam.ac.uk/fms27/papers/2004-stajano-hats.pdf (to appear, 2004)
    • Stajano, F.: One user, many hats; and, sometimes, no hat-towards a secure yet usable PDA. In: The Twelfth International Workshop on Security Protocols, http://www-lce.eng.cam.ac.uk/fms27/papers/2004-stajano-hats.pdf (to appear, 2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.