共 29 条
- [1] Alonso R.S., Saavedra A., Tapia D., Corchado J.M., Heterogeneous wireless sensor networks in a telemonitoring system for homecare, Proceedings of IWANN, 2, pp. 663-670, (2009)
- [2] Augusto J.C., Ambient intelligence: Basic concepts and applications, Computer and Information Science: Software and Data Technologies, 10, (2008)
- [3] Basin D., Cremers C., Kunihiko M., Dai W., Improving the security of cryptographic protocol standards, Int. J. IEEE Security & Privacy, 13, 3, pp. 24-31, (2014)
- [4] Beckwith R., Lederer S., Designing for one’s dotage: Ubicomp and residential care facilities, Conf. Home-Oriented Informatics and Telematics (HOIT 03), (2013)
- [5] Bellifemine F., Caire G., Trucco T., Rimassa G., Jade programmer’s guide, version 3.2, Journal of Telecom Italia Lab, (2004)
- [6] Bouchemal N., Maamri R., SGP: Security by guaranty protocol, Proceeding of International Conference on Distributed Computing and Artificial Intelligence (DCAI’12), 151, pp. 289-296, (2012)
- [7] Bouchemal N., Maamri R., SPIG: Security by privileges, inspection and guaranty for ambient agents group, Proceeding of International Conference on Agents and Artificial Intelligence (ICAART’13), (2013)
- [8] Bouchemal N., Maamri R., Securing ambient agents groups by using verification, judgment and surveillance, International Journal of Ambient Computing Intelligence (IJACI), 5, 3, pp. 44-60, (2013)
- [9] Caire G., LEAP 3.0 User Guide, TILAB, JADE-LEAP, (2003)
- [10] Collins M., Dobson S., Nixon P., Security issues with pervasive computing frameworks, Proceeding of Workshop on Privacy, Trust and Identity Issues for Ambient Intelligence at Pervasive, (2006)