ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
Nonlinear Dynamics
◽
10.1007/s11071-013-1029-y
◽
2013
◽
Vol 74
(4)
◽
pp. 1133-1143
◽
Cited By ~ 39
Author(s):
Chun-Ta Li
◽
Cheng-Chi Lee
◽
Chi-Yao Weng
Keyword(s):
Ubiquitous Computing
◽
Chaotic Maps
◽
User Authentication
◽
Privacy Preserving
◽
Dos Attacks
◽
Extended Chaotic Maps
◽
Computing Environments
◽
Pervasive And Ubiquitous Computing
◽
Ubiquitous Computing Environments
Download Full-text
Related Documents
Cited By
References
A flexible, privacy-preserving authentication framework for ubiquitous computing environments
Proceedings 22nd International Conference on Distributed Computing Systems Workshops
◽
10.1109/icdcsw.2002.1030861
◽
2003
◽
Cited By ~ 26
Author(s):
J. Al-Muhtadi
◽
A. Ranganathan
◽
R. Campbell
◽
M.D. Mickunas
Keyword(s):
Ubiquitous Computing
◽
Privacy Preserving
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments
Lecture Notes in Computer Science - Internet and Network Economics
◽
10.1007/11600930_49
◽
2005
◽
pp. 491-499
Author(s):
Myung-hee Kang
◽
Hwang-bin Ryou
◽
WoongChul Choi
Keyword(s):
Ubiquitous Computing
◽
Key Agreement
◽
User Authentication
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments
Public Key Infrastructures, Services and Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22633-5_4
◽
2011
◽
pp. 45-60
◽
Cited By ~ 4
Author(s):
Jangseong Kim
◽
Joonsang Baek
◽
Kwangjo Kim
◽
Jianying Zhou
Keyword(s):
Ubiquitous Computing
◽
Service Discovery
◽
Privacy Preserving
◽
Computing Environments
◽
Ubiquitous Computing Environments
◽
Service Discovery Protocol
Download Full-text
Privacy-Preserving ID-Based Service Provision in Ubiquitous Computing Environments
On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30470-8_10
◽
2004
◽
pp. 21-22
Author(s):
Keon Myung Lee
◽
Sang Ho Lee
Keyword(s):
Ubiquitous Computing
◽
Service Provision
◽
Privacy Preserving
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Routing through the mist: privacy preserving communication in ubiquitous computing environments
Proceedings 22nd International Conference on Distributed Computing Systems
◽
10.1109/icdcs.2002.1022244
◽
2003
◽
Cited By ~ 73
Author(s):
J. Al-Muhtadi
◽
R. Campbell
◽
A. Kapadia
◽
M.D. Mickunas
◽
Seung Yi
Keyword(s):
Ubiquitous Computing
◽
Privacy Preserving
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
A strategy for cooperative reasoning in ubiquitous computing environments
Proceedings of the 6th international workshop on Middleware for pervasive and ad-hoc computing - MPAC '08
◽
10.1145/1462789.1462801
◽
2008
◽
Author(s):
José Viterbo
◽
Markus Endler
Keyword(s):
Ubiquitous Computing
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Methodical approaches to prove the effects of subliminal perception in ubiquitous computing environments
Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12
◽
10.1145/2370216.2370453
◽
2012
◽
Author(s):
Andreas Riener
◽
Miriam Reiner
◽
Myounghoon Jeon
◽
Pierre Chalfoun
Keyword(s):
Ubiquitous Computing
◽
Subliminal Perception
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
A lightweight middleware protocol for ad hoc distributed object computing in ubiquitous computing environments
Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003.
◽
10.1109/isorc.2003.1199252
◽
2004
◽
Cited By ~ 2
Author(s):
S.S. Yau
◽
F. Karim
Keyword(s):
Ubiquitous Computing
◽
Ad Hoc
◽
Distributed Object Computing
◽
Distributed Object
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Access control using threshold cryptography for ubiquitous computing environments
Journal of King Saud University - Computer and Information Sciences
◽
10.1016/j.jksuci.2011.05.003
◽
2011
◽
Vol 23
(2)
◽
pp. 71-78
◽
Cited By ~ 3
Author(s):
Jalal Al-Muhtadi
◽
Raquel Hill
◽
Sumayah Al-Rwais
Keyword(s):
Access Control
◽
Ubiquitous Computing
◽
Threshold Cryptography
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
An Ontology-based Framework for Dynamic Resource Management in Ubiquitous Computing Environments
Second International Conference on Embedded Software and Systems (ICESS'05)
◽
10.1109/icess.2005.29
◽
2006
◽
Cited By ~ 3
Author(s):
John Soldatos Ippokratis Pandis
Keyword(s):
Resource Management
◽
Ubiquitous Computing
◽
Dynamic Resource Management
◽
Computing Environments
◽
Dynamic Resource
◽
Ubiquitous Computing Environments
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close