메뉴 건너뛰기




Volumn 7114 LNCS, Issue , 2011, Pages 115-125

When context is better than identity: Authentication by context using empirical channels

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING APPLICATIONS; EMPIRICAL CHANNELS; SECURITY PROTOCOLS;

EID: 84862969473     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25867-1_10     Document Type: Conference Paper
Times cited : (1)

References (12)
  • 2
    • 84958048194 scopus 로고    scopus 로고
    • The Small World Web
    • Abiteboul, S., Vercoustre, A.-M. (eds.) ECDL 1999. Springer, Heidelberg
    • Adamic, L.A.: The Small World Web. In: Abiteboul, S., Vercoustre, A.-M. (eds.) ECDL 1999. LNCS, vol. 1696, pp. 443-852. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1696 , pp. 443-852
    • Adamic, L.A.1
  • 3
    • 0033539175 scopus 로고    scopus 로고
    • Diameter of the world-wide web
    • Albert, R., Jeong, H., Barabasi, A.: Diameter of the world-wide web. Nature 401, 130-131 (1999)
    • (1999) Nature , vol.401 , pp. 130-131
    • Albert, R.1    Jeong, H.2    Barabasi, A.3
  • 4
    • 84978975459 scopus 로고    scopus 로고
    • Why isn't trust transitive?
    • Lomas, M. (ed.) Security Protocols 1996. Springer, Heidelberg
    • Christianson, B., Harbison, W.: Why isn't trust transitive? In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 171-176. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1189 , pp. 171-176
    • Christianson, B.1    Harbison, W.2
  • 5
    • 84900830868 scopus 로고    scopus 로고
    • Understanding and using context
    • Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5, 4-7 (2001)
    • (2001) Personal Ubiquitous Comput. , vol.5 , pp. 4-7
    • Dey, A.K.1
  • 7
    • 22944435846 scopus 로고    scopus 로고
    • Accuracy of metrics for inferring trust and reputation in semantic web-based social networks
    • Engineering Knowledge in the Age of the Semantic Web - 14th International Conference, EKAW 2004
    • Golbeck, J., Hendler, J.: Accuracy of metrics for inferring trust and reputation in semantic web-based social networks. In: Motta, E., Shadbolt, N.R., Stutt, A., Gibbins, N. (eds.) EKAW 2004. LNCS (LNAI), vol. 3257, pp. 116-131. Springer, Heidelberg (2004) (Pubitemid 41050230)
    • (2004) Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) , vol.3257 , pp. 116-131
    • Golbeck, J.1    Hendler, J.2
  • 10
    • 84947251443 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks
    • Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. Springer, Heidelberg
    • Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In:Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172-182. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1796 , pp. 172-182
    • Stajano, F.1    Anderson, R.2
  • 11
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 12
    • 38149126229 scopus 로고    scopus 로고
    • Multi-Channel Protocols
    • Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. Springer, Heidelberg
    • Wong, F.-L., Stajano, F.: Multi-Channel Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 112-127. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4631 , pp. 112-127
    • Wong, F.-L.1    Stajano, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.