共 24 条
[1]
[Anonymous], 1997, INT WORKSH INF SEC
[3]
Calvelli C., P 1992 COMP SEC FDN, VV, P92
[4]
Context Aware Ubiquitous Biometrics in Edge of Military Things
[J].
IEEE CLOUD COMPUTING,
2017, 4 (06)
:16-20
[5]
Fangguo Z., 2003, CITESEER
[6]
Foster I., 1998, 5th ACM Conference on Computer and Communications Security, P83, DOI 10.1145/288090.288111
[7]
Fuchsbauer G, 2008, LECT NOTES COMPUT SC, V5229, P201, DOI 10.1007/978-3-540-85855-3_14
[8]
Huang XY, 2006, LECT NOTES COMPUT SC, V4325, P473
[10]
Kim S., 1997, Information and Communications Security. First International Conference, ICIS '97. Proceedings, P223, DOI 10.1007/BFb0028478