메뉴 건너뛰기




Volumn 60, Issue 2, 2010, Pages 187-197

Security middleware approaches and issues for ubiquitous applications

Author keywords

Ad hoc networks; Authentication; P2P systems; Pervasive environments; Security middleware; Ubiquitous computing

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; DISTRIBUTED COMPUTER SYSTEMS; MIDDLEWARE; PEER TO PEER NETWORKS;

EID: 77955711319     PISSN: 08981221     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.camwa.2010.01.009     Document Type: Article
Times cited : (19)

References (22)
  • 1
    • 77955714675 scopus 로고    scopus 로고
    • Middleware, Wikipedia, retrieved March 1, 2009, from
    • Middleware, Wikipedia, retrieved March 1, 2009, from: http://en.wikipedia.org/wiki/Middleware.
  • 7
    • 74549213283 scopus 로고    scopus 로고
    • retrieved March 1
    • U. Lang, Middleware Security, retrieved March 1, 2009, from: http://www.ime.usp.br/~kon/MAC5759/aulas/slides/UlrichSecurity.ppt.
    • (2009) Middleware Security
    • Lang, U.1
  • 8
  • 10
    • 32944470598 scopus 로고    scopus 로고
    • A survey of middleware paradigms for mobile computing
    • Carleton Univ. Systems and Computing Engineering
    • A. Gaddah, T. Kunz, A survey of middleware paradigms for mobile computing, Technical Report SCE-03-16, Carleton Univ. Systems and Computing Engineering, 2003.
    • (2003) Technical Report SCE-03-16
    • Gaddah, A.1    Kunz, T.2
  • 11
    • 77955713405 scopus 로고    scopus 로고
    • A survey of middleware for mobile ad hoc networks
    • Ecole Nationale Supérieure des Télécommunications, France, January
    • G. Paroux, I. Demeure, D. Baruch, A survey of middleware for mobile ad hoc networks, Technical Report 2007D004, Ecole Nationale Suprieure des Tlcommunications, France, January 2007.
    • (2007) Technical Report 2007D004
    • Paroux, G.1    Demeure, I.2    Baruch, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.