Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Irfan Zakiuddin"'
Autor:
Paul Whittaker, Michael Goldsmith, Irfan Zakiuddin, Sadie Creese, Richard Harrison, Bill Roscoe
Publikováno v:
Security in Pervasive Computing ISBN: 9783540255215
SPC
SPC
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classified by variants of the Dolev-Yao attacker model. We refine this class
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f310594c6a0bcd366f586e3d12916244
https://ora.ox.ac.uk/objects/uuid:9053c555-bd5d-408e-9566-7dce0c838caf
https://ora.ox.ac.uk/objects/uuid:9053c555-bd5d-408e-9566-7dce0c838caf
Publikováno v:
The International Series in Engineering and Computer Science ISBN: 0387234616
Pervasive networks foresee communicating and computing devices embedded throughout our environment. This will cause huge increases in the complexity of network infrastructures and the information services available over them. The challenge of managin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0ba8bd201816585f190a0cddd8d2e863
https://doi.org/10.1007/0-387-23462-4_9
https://doi.org/10.1007/0-387-23462-4_9
Publikováno v:
Privacy‚ Security and Trust within the Context of Pervasive Computing.
Publikováno v:
Security in Pervasive Computing ISBN: 9783540208877
SPC
SPC
Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d5472f303cfee76aeb7220a57eb9d32d
https://doi.org/10.1007/978-3-540-39881-3_12
https://doi.org/10.1007/978-3-540-39881-3_12