-
1
-
-
72249097286
-
Developing network software and communications protocols towards the internet of things
-
Dublin, Ireland, June 16-19 ACM, New York
-
Silverajan, B., Harju, J.: Developing network software and communications protocols towards the internet of things. In: Proceedings of the Fourth International ICST Conference on Communication System Software and MiddlewaRE, COMSWARE 2009, Dublin, Ireland, June 16-19, pp. 1-8. ACM, New York (2009)
-
(2009)
Proceedings of the Fourth International ICST Conference on Communication System Software and MiddlewaRE, COMSWARE 2009
, pp. 1-8
-
-
Silverajan, B.1
Harju, J.2
-
2
-
-
0001749548
-
The design and implementation of an intentional naming system
-
Charleston, South Carolina, US, December 12-15 ACM, New York
-
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, SOSP 1999, Charleston, South Carolina, US, December 12-15, pp. 186-201. ACM, New York (1999)
-
(1999)
Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, SOSP 1999
, pp. 186-201
-
-
Adjie-Winoto, W.1
Schwartz, E.2
Balakrishnan, H.3
Lilley, J.4
-
3
-
-
33845653104
-
Network discovery and verification
-
Beerliova, Z., Eberhard, F., Erlebach, T., Hall, A., Hoffmann, M., Mihalák, M., Ram, L.S.: Network Discovery and Verification. IEEE Journal on Selected Areas in Communications 24(12), 2168-2181 (2006)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.12
, pp. 2168-2181
-
-
Beerliova, Z.1
Eberhard, F.2
Erlebach, T.3
Hall, A.4
Hoffmann, M.5
Mihalák, M.6
Ram, L.S.7
-
5
-
-
4444331720
-
Security as a new dimension in embedded system design
-
San Diego, CA, USA, June 7-11 ACM, New York
-
Kocher, P., Lee, R., McGraw, G., Raghunathan, A.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Annual Design Automation Conference, DAC 2004, San Diego, CA, USA, June 7-11, pp. 753-760. ACM, New York (2004)
-
(2004)
Proceedings of the 41st Annual Design Automation Conference, DAC 2004
, pp. 753-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
-
6
-
-
33644591555
-
Wireless security threat taxonomy
-
June 18-20
-
Welch, D., Lathrop, S.: Wireless security threat taxonomy. In: Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, June 18-20, pp. 76-83 (2003)
-
(2003)
Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society
, pp. 76-83
-
-
Welch, D.1
Lathrop, S.2
-
9
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Neuman, B.C., Ts'o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine 32(9), 33-38 (1994)
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
11
-
-
77957582830
-
-
OpenID, http://openid.net/specs/openid-authentication-1-1.html
-
-
-
-
14
-
-
30344473624
-
Federated identity management
-
Shim, S.S.Y., Bhalla, P.: Federated identity management. IEEE Computer 38(12), 120-122(2005)
-
(2005)
IEEE Computer
, vol.38
, Issue.12
, pp. 120-122
-
-
Shim, S.S.Y.1
Bhalla, P.2
|