-
2
-
-
0142249936
-
Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing
-
Proceedings of Fifth International Conference on Ubiquitous Computing Ubicomp, Springer
-
J. E. Bardram, R. E. Kjær, and M. Pedersen. "Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing," Proceedings of Fifth International Conference on Ubiquitous Computing (Ubicomp), LNCS 2864, Springer, 2003, pp. 107-123.
-
(2003)
LNCS
, vol.2864
, pp. 107-123
-
-
Bardram, J.E.1
Kjær, R.E.2
Pedersen, M.3
-
3
-
-
0030086382
-
Role-Based Access Control Models
-
IEEE Press
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models," IEEE Computer 29(2), IEEE Press, 1996, pp. 38-47.
-
(1996)
IEEE Computer 29(2)
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
4
-
-
33751044073
-
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
-
Internet Society
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proceedings of Network and Distributed System Security Symposium (NDSS), Internet Society, 2002, pp. 23-35.
-
(2002)
Proceedings of Network and Distributed System Security Symposium (NDSS)
, pp. 23-35
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
5
-
-
84947251443
-
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
-
Proceedings of the 7th International Workshop on Security Protocols, Springer
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," Proceedings of the 7th International Workshop on Security Protocols, LNCS 1796, Springer, 1999, pp. 172-194.
-
(1999)
LNCS
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
6
-
-
33750318741
-
Proximity Based Access Control in Smart-Emergency Departments
-
S. K. S. Gupta, T. Mukherjee, K. Venkatasubramanian, and T. Taylor, "Proximity Based Access Control in Smart-Emergency Departments," Proceedings of 4th IEEE Conference on Pervasive Computing Workshops, First Workshop On Ubiquitous & Pervasive Health Care (UbiCare), 2006, pp. 512-516.
-
(2006)
Proceedings of 4th IEEE Conference on Pervasive Computing Workshops, First Workshop On Ubiquitous & Pervasive Health Care (UbiCare)
, pp. 512-516
-
-
Gupta, S.K.S.1
Mukherjee, T.2
Venkatasubramanian, K.3
Taylor, T.4
-
7
-
-
84945588227
-
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Artefacts
-
Proceedings of Third International Conference on Ubiquitous Computing Ubicomp, Springer
-
L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Artefacts," Proceedings of Third International Conference on Ubiquitous Computing (Ubicomp), LNCS 2201, Springer, 2001, pp.116-122.
-
(2001)
LNCS
, vol.2201
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.W.6
-
11
-
-
46849090779
-
Ubiquitous Computing Environments and Its Usage Access Control
-
Article
-
H. Wang, Y. Zhang, J. Cao, "Ubiquitous Computing Environments and Its Usage Access Control," Proceedings of the 1st international conference on Scalable information systems, 2006, Article No. 6.
-
(2006)
Proceedings of the 1st international conference on Scalable information systems
, Issue.6
-
-
Wang, H.1
Zhang, Y.2
Cao, J.3
-
12
-
-
33751023773
-
Secure Device Pairing based on a Visual Channel
-
N. Saxena J. Ekberg, K. Kostiainen, and N. Asokan, "Secure Device Pairing based on a Visual Channel," Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006, pp. 306-313.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.2
Kostiainen, K.3
Asokan, N.4
-
13
-
-
33947635594
-
Loud and Clear: Human-verifiable Authentication Based on Audio
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and Clear: Human-verifiable Authentication Based on Audio," Proceedings of 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006, pp.10.
-
(2006)
Proceedings of 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
, pp. 10
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
15
-
-
48349091272
-
-
Wireless USB Specification. Association Models Supplement. Revision 1.0. USB Implementers Forum. Http://www.usb.org/developers/wusb/, 2006.
-
Wireless USB Specification. Association Models Supplement. Revision 1.0. USB Implementers Forum. Http://www.usb.org/developers/wusb/, 2006.
-
-
-
-
16
-
-
38149097247
-
Security Associations in Personal Networks: A Comparative Analysis
-
Technical Report NRC-TR-2007-004, Nokia Research Center
-
J. Suomalainen, J. Valkonen, and N. Asokan. "Security Associations in Personal Networks: A Comparative Analysis." Technical Report NRC-TR-2007-004, Nokia Research Center, 2007.
-
(2007)
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
|