메뉴 건너뛰기




Volumn , Issue 84, 2001, Pages

Context authentication using constrained channels

Author keywords

Authentication; Context aware computing; Location based computing; Security

Indexed keywords

AUTHENTICATION; COMPUTING SYSTEMS; CONTEXT-AWARE COMPUTING; LOCATION-BASED COMPUTING;

EID: 84862447517     PISSN: None     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (10)
  • 1
    • 84862445086 scopus 로고    scopus 로고
    • The challenges and opportunities of integrating the physical world and networked systems
    • John Barton & Tim Kindberg (2001). "The challenges and opportunities of integrating the physical world and networked systems". HPL Technical report HPL-2001-18, available as http://www.champignon.net/ TimKindberg/Mobi comChallengeAsTR.pdf.
    • (2001) HPL Technical Report , vol.HPL-2001-18
    • Barton, J.1    Kindberg, T.2
  • 2
    • 0035281893 scopus 로고    scopus 로고
    • A webbased nomadic computing system
    • To appear, Elsevier
    • Tim Kindberg & John Barton (2001). "A WebBased Nomadic Computing System". To appear, Computer Networks, Elsevier. Available as http://www.cooltown.hp.com/papers/nomadic/n omadic.htm.
    • (2001) Computer Networks
    • Kindberg, T.1    Barton, J.2
  • 3
    • 0013142808 scopus 로고    scopus 로고
    • People, places, things: Web presence for the real world
    • Tim Kindberg et al. (2000). "People, Places, Things: Web Presence for the Real World". In proceedings WMCSA2000. Available as http://www.cooltown.hp.com/papers/webpres/webpresence.htm.
    • (2000) Proceedings WMCSA2000
    • Kindberg, T.1
  • 4
    • 84958985122 scopus 로고    scopus 로고
    • Creating web representations for places
    • Springer
    • Debbie Caswell & Philippe Debaty (2000). "Creating web representations for places". Proceedings Handheld and Ubiquitous Computing 2000, Springer, pp. 114-126. Available as http://www.cooltown.hp.com/ papers/placeman/placesHUC2000.pdf.
    • (2000) Proceedings Handheld and Ubiquitous Computing 2000 , pp. 114-126
    • Caswell, D.1    Debaty, P.2
  • 6
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • February
    • Dorothy E. Denning and Peter F. MacDoran (1996). "Location-Based Authentication: Grounding Cyberspace for Better Security". In Computer Fraud & Security, February. Available as http://www.cosc.georgetown.edu/ ~denning/infosec/Grounding.txt.
    • (1996) Computer Fraud & Security
    • Denning, D.E.1    MacDoran, P.F.2
  • 7
    • 0003337018 scopus 로고    scopus 로고
    • Transport layer security
    • T. Dierks and C. Allen (1999). "Transport Layer Security". RFC 2246. www.ietf.org.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 9
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
    • SEDEP Paris
    • Y. Desmedt. "Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them," SecuriCom'88, SEDEP Paris, 1988, pp 15-17.
    • (1988) SecuriCom'88 , pp. 15-17
    • Desmedt, Y.1
  • 10
    • 84976295016 scopus 로고    scopus 로고
    • Distance-bounding protocols
    • Lecture Notes in Computer Science, no. 765, SpringerVerlag
    • S. Brands and D. Chaum, "Distance-Bounding Protocols," Proc. EUROCRYPT '93, Lecture Notes in Computer Science, no. 765, SpringerVerlag, pp. 344-359.
    • Proc. EUROCRYPT '93 , pp. 344-359
    • Brands, S.1    Chaum, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.