共 11 条
- [1] AHAMED SI, P 31 ANN IN IN PRESS
- [2] A statistical matching approach to detect privacy violation for trust-based collaborations [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 598 - 602
- [3] Cerberus: A context-aware security scheme for smart spaces [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 489 - 496
- [4] Almenárez F, 2005, LECT NOTES COMPUT SC, V3450, P225
- [5] [Anonymous], LNCS
- [6] Gupta SK, 2006, 4 ANN IEEE INT C PER
- [7] Exploiting hierarchical identity-based encryption for access control to pervasive computing information [J]. FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 384 - 393
- [8] HENGARTNER U, 2006, 4 ANN IEEE INT C PER
- [9] Keoh SL, 2005, LECT NOTES COMPUT SC, V3450, P210
- [10] Sharmin M, 2006, PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, P258