메뉴 건너뛰기




Volumn , Issue , 2002, Pages 14-21

Context authentication using constrained channels

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; HTTP; HYPERTEXT SYSTEMS; INTERNET PROTOCOLS; UBIQUITOUS COMPUTING;

EID: 84961644448     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MCSA.2002.1017481     Document Type: Conference Paper
Times cited : (48)

References (15)
  • 1
    • 84862445086 scopus 로고    scopus 로고
    • The challenges and opportunities of integrating the physical world and networked systems
    • John Barton & Tim Kindberg (2001). "The challenges and opportunities of integrating the physical world and networked systems". HPL Technical report HPL-2001-18.
    • (2001) HPL Technical Report
    • Barton, J.1    Kindberg, T.2
  • 2
    • 0035281893 scopus 로고    scopus 로고
    • A Web-Based Nomadic Computing System
    • Elsevier, March 2001
    • Tim Kindberg & John Barton (2001). "A Web-Based Nomadic Computing System". Computer Networks, Elsevier, vol 35, no. 4, March 2001, pp. 443-456.
    • (2001) Computer Networks , vol.35 , Issue.4 , pp. 443-456
    • Kindberg, T.1    Barton, J.2
  • 3
    • 0013142808 scopus 로고    scopus 로고
    • People, Places, Things: Web Presence for the Real World
    • IEEEE Computer Society, Dec. 2000
    • Tim Kindberg et al. (2000). "People, Places, Things: Web Presence for the Real World". In proceedings WMCSA2000, IEEEE Computer Society, Dec. 2000, pp. 19-28.
    • (2000) Proceedings WMCSA2000 , pp. 19-28
    • Kindberg, T.1
  • 6
    • 1542341270 scopus 로고    scopus 로고
    • Location-Based Authentication: Grounding Cyberspace for Better Security
    • February
    • Dorothy E. Denning and Peter F. MacDoran (1996). "Location-Based Authentication: Grounding Cyberspace for Better Security". In Computer Fraud & Security, February. http://www.cosc.georgetown.edu/~denning/infosec/Grounding.txt.
    • (1996) Computer Fraud & Security
    • Denning, D.E.1    MacDoran, P.F.2
  • 9
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
    • SEDEP Paris
    • Y. Desmedt. "Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them," SecuriCom'88, SEDEP Paris, 1988, pp 15-17.
    • (1988) SecuriCom'88 , pp. 15-17
    • Desmedt, Y.1
  • 10
    • 84976295016 scopus 로고    scopus 로고
    • Distance-Bounding Protocols
    • Proc. EUROCRYPT '93, Springer-Verlag
    • S. Brands and D. Chaum, "Distance-Bounding Protocols," Proc. EUROCRYPT '93, Lecture Notes in Computer Science, no. 765, Springer-Verlag, pp. 344-359.
    • Lecture Notes in Computer Science , Issue.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 12
    • 0033324263 scopus 로고    scopus 로고
    • On Location-Restricted Services
    • November/December Special Issue on Networking Security
    • Eran Gabber and Avisahi Wool, "On Location-Restricted Services", IEEE Network, November/December 1999, pp. 44-52. Special Issue on Networking Security.
    • (1999) IEEE Network , pp. 44-52
    • Gabber, E.1    Wool, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.