-
1
-
-
0001853125
-
The computer for the twenty-first century
-
Weiser M: 'The computer for the twenty-first century', Scientific American, 256, No 3, pp 94-104 (1991).
-
(1991)
Scientific American
, vol.256
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
2
-
-
3042654543
-
-
PhD Transfer Report, Imperial College of Science, Technology and Medicine, Department of Computing
-
Grandison T: 'Trust specification and analysis for Internet application', PhD Transfer Report, Imperial College of Science, Technology and Medicine, Department of Computing (2001).
-
(2001)
Trust Specification and Analysis for Internet Application
-
-
Grandison, T.1
-
3
-
-
7644226470
-
-
PhD theses, Imperial College of Science, Technology and Medicine, Department of Computing
-
Grandison T: 'Trust management for Internet applications', PhD theses, Imperial College of Science, Technology and Medicine, Department of Computing (2003).
-
(2003)
Trust Management for Internet Applications
-
-
Grandison, T.1
-
7
-
-
0003839495
-
-
PhD Department of Computer Science and Mathematics, University of Sterling
-
Marsh S: 'Formalising trust as a computational concept', PhD Department of Computer Science and Mathematics, University of Sterling (1994).
-
(1994)
Formalising Trust As a Computational Concept
-
-
Marsh, S.1
-
10
-
-
0013142808
-
People, places, things: Web presence for the real world
-
Kindberg T, Barton J, Morgan J, Becker G, Caswell D, Debaty P, Gopal G, Frid M, Krishnan V, Morris M, Schettino J and Serra B: 'People, places, things: Web Presence for the Real World', in Proc WMCSA2000 (2001).
-
(2001)
Proc WMCSA2000
-
-
Kindberg, T.1
Barton, J.2
Morgan, J.3
Becker, G.4
Caswell, D.5
Debaty, P.6
Gopal, G.7
Frid, M.8
Krishnan, V.9
Morris, M.10
Schettino, J.11
Serra, B.12
-
11
-
-
7644239205
-
Enabling secure ubiquitous interactions
-
Eustice K, Markstrum S, Ramakrishna V, Reiher P, Kleinrock L and Popek G: 'Enabling secure ubiquitous interactions', 1st International Workshop on Middleware for Pervasive ad hoc Computing (2003).
-
(2003)
1st International Workshop on Middleware for Pervasive Ad Hoc Computing
-
-
Eustice, K.1
Markstrum, S.2
Ramakrishna, V.3
Reiher, P.4
Kleinrock, L.5
Popek, G.6
-
12
-
-
7644232973
-
Security for whom? The shifting security assumptions of pervasive computing
-
Springer-Verlag
-
Stajano F: 'Security For Whom? The Shifting Security Assumptions of Pervasive Computing', Springer-Verlag, Proceedings of International Security Symposium (2002).
-
(2002)
Proceedings of International Security Symposium
-
-
Stajano, F.1
-
13
-
-
29244440808
-
The butt of the iceberg: Hidden security problems of ubiquitous systems
-
Basten T, Geilen M and deGroot H (Eds), Kluwer Publishers
-
Stajano F and Crowcroft J: 'The butt of the iceberg: hidden security problems of ubiquitous systems', in Basten T, Geilen M and deGroot H (Eds): 'Ambient Intelligence: Impact on Embedded System Design', Kluwer Publishers (2003).
-
(2003)
Ambient Intelligence: Impact on Embedded System Design
-
-
Stajano, F.1
Crowcroft, J.2
-
17
-
-
35248890054
-
Trusting collaboration in global computing
-
Springer-Verlag
-
English C, Wagealla W, Nixon P, Terzis S, McGettrick A and Lowe H: 'Trusting collaboration in global computing', The First International Conference on Trust Management, Springer-Verlag, Vol 2692, pp 136-149 (2003).
-
(2003)
The First International Conference on Trust Management
, vol.2692
, pp. 136-149
-
-
English, C.1
Wagealla, W.2
Nixon, P.3
Terzis, S.4
McGettrick, A.5
Lowe, H.6
-
19
-
-
3042652757
-
Security and privacy of the PTP
-
Makki K, Pissinou N, Makki K and Park E (Eds), Kluwer Publishers
-
Veijalainen J, Seleznyov A and Mazhelis O: 'Security and privacy of the PTP', in Makki K, Pissinou N, Makki K and Park E (Eds): 'Mobile and wireless Internet: protocols, algorithms, and systems', Kluwer Publishers, pp 165-190 (2003).
-
(2003)
Mobile and Wireless Internet: Protocols, Algorithms, and Systems
, pp. 165-190
-
-
Veijalainen, J.1
Seleznyov, A.2
Mazhelis, O.3
|