![]() |
Volumn , Issue , 2008, Pages 639-644
|
Establishing a trusted architecture on pervasive terminals for securing context processing
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CONTEXT PROCESSING;
CONTEXT-AWARE;
INTERNATIONAL CONFERENCES;
PERVASIVE COMPUTING;
PERVASIVE COMPUTING ENVIRONMENTS;
SECURITY CHALLENGES;
SECURITY REQUIREMENTS;
TERMINAL ARCHITECTURES;
TERMINAL EQUIPMENTS;
TRUSTED COMPUTING TECHNOLOGIES;
COMPUTER SYSTEMS;
DATA STORAGE EQUIPMENT;
PORT TERMINALS;
RELIABILITY;
TECHNOLOGY;
|
EID: 49149111707
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/PERCOM.2008.39 Document Type: Conference Paper |
Times cited : (4)
|
References (15)
|