메뉴 건너뛰기




Volumn 54, Issue 1, 2005, Pages 49-71

The claim tool kit for ad hoc recognition of peer entities

Author keywords

Ad hoc peer to peer; Authentication; Auto configuration; Performance

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER ARCHITECTURE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; JAVA PROGRAMMING LANGUAGE; SMART CARDS;

EID: 7544236301     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2004.05.005     Document Type: Conference Paper
Times cited : (2)

References (35)
  • 4
    • 84900830868 scopus 로고    scopus 로고
    • Understanding and using context
    • Dey A.K. Understanding and using context. Personal and Ubiquitous Computing Journal. 5:(1):2001;4-7 http://www.cc.gatech.edu/fce/ctk/pubs/PeTe5-1.pdf.
    • (2001) Personal and Ubiquitous Computing Journal , vol.5 , Issue.1 , pp. 4-7
    • Dey, A.K.1
  • 6
    • 0042963605 scopus 로고    scopus 로고
    • Website, Internet Research Task Force
    • Delay Tolerant Network, Website, Internet Research Task Force. http://www.dtnrg.org.
    • Delay Tolerant Network
  • 7
    • 3042721109 scopus 로고    scopus 로고
    • The Free Software Foundation
    • The GNU Privacy Handbook, The Free Software Foundation, 1999. http://www.gnupg.org/gph/en/manual.html.
    • (1999) The GNU Privacy Handbook
  • 12
    • 22844453931 scopus 로고    scopus 로고
    • Performance assessment framework for distributed object architectures
    • September, 13-16, 1999, Lecture Notes in Computer Science, Springer
    • Juric B.M., Welzer T., Rozman I., Hericko M., Brumen B., Domanjko T., Zivkovic A. Performance assessment framework for distributed object architectures. ADBIS'99. September, 13-16, 1999 Lecture Notes in Computer Science. vol. 1691:1999;349-366 Springer, http://lisa.uni-mb.si/~juric/PerfAssessmentFrw.pdf.
    • (1999) ADBIS'99 , vol.1691 , pp. 349-366
    • Juric, B.M.1    Welzer, T.2    Rozman, I.3    Hericko, M.4    Brumen, B.5    Domanjko, T.6    Zivkovic, A.7
  • 18
    • 85016682337 scopus 로고    scopus 로고
    • Privacy through pseudonymity in user-adaptive systems
    • Kobsa A., Schreck J. Privacy through pseudonymity in user-adaptive systems. ACM Transactions on Internet Technology. 3:(2):2003;149-183 http://www.ics.uci.edu/~kobsa/papers/2003-TOIT-kobsa.pdf.
    • (2003) ACM Transactions on Internet Technology , vol.3 , Issue.2 , pp. 149-183
    • Kobsa, A.1    Schreck, J.2
  • 21
    • 0034310033 scopus 로고    scopus 로고
    • Models of the small world: A review
    • Newman M.E.J. Models of the small world: a review. J. Stat. Phys. 101:2000;819-841 http://citeseer.nj.nec.com/487139.html.
    • (2000) J. Stat. Phys. , vol.101 , pp. 819-841
    • Newman, M.E.J.1
  • 27
    • 3042781459 scopus 로고    scopus 로고
    • Privacy recovery with disposable email addresses
    • IEEE Security & Privacy. (special issue)
    • Seigneur J.-M., Jensen C.D. Privacy recovery with disposable email addresses. Understanding Privacy. 1 (6):2003;IEEE Security & Privacy. (special issue) http://www.computer.org/security/v1n6/j6sei.htm.
    • (2003) Understanding Privacy , vol.1 , Issue.6
    • Seigneur, J.-M.1    Jensen, C.D.2
  • 29
    • 2442422211 scopus 로고    scopus 로고
    • Trust enhanced ubiquitous payment without too much privacy loss
    • ACM
    • Seigneur J.-M., Jensen C.D. Trust enhanced ubiquitous payment without too much privacy loss. Proceedings of SAC 2004. 2004;ACM.
    • (2004) Proceedings of SAC 2004
    • Seigneur, J.-M.1    Jensen, C.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.