ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
◽
10.1109/mue.2007.19
◽
2007
◽
Cited By ~ 1
Author(s):
Ren-Chiun Wang
◽
Wen-Shenq Juang
◽
Chen-Chi Wu
◽
Chin-Laung Lei
Keyword(s):
Ubiquitous Computing
◽
Key Agreement
◽
User Anonymity
◽
Key Agreement Protocol
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Related Documents
Cited By
References
Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments
Lecture Notes in Computer Science - Internet and Network Economics
◽
10.1007/11600930_49
◽
2005
◽
pp. 491-499
Author(s):
Myung-hee Kang
◽
Hwang-bin Ryou
◽
WoongChul Choi
Keyword(s):
Ubiquitous Computing
◽
Key Agreement
◽
User Authentication
◽
Authentication And Key Agreement
◽
Key Agreement Protocol
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
A strategy for cooperative reasoning in ubiquitous computing environments
Proceedings of the 6th international workshop on Middleware for pervasive and ad-hoc computing - MPAC '08
◽
10.1145/1462789.1462801
◽
2008
◽
Author(s):
José Viterbo
◽
Markus Endler
Keyword(s):
Ubiquitous Computing
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Methodical approaches to prove the effects of subliminal perception in ubiquitous computing environments
Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12
◽
10.1145/2370216.2370453
◽
2012
◽
Author(s):
Andreas Riener
◽
Miriam Reiner
◽
Myounghoon Jeon
◽
Pierre Chalfoun
Keyword(s):
Ubiquitous Computing
◽
Subliminal Perception
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
A lightweight middleware protocol for ad hoc distributed object computing in ubiquitous computing environments
Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003.
◽
10.1109/isorc.2003.1199252
◽
2004
◽
Cited By ~ 2
Author(s):
S.S. Yau
◽
F. Karim
Keyword(s):
Ubiquitous Computing
◽
Ad Hoc
◽
Distributed Object Computing
◽
Distributed Object
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Access control using threshold cryptography for ubiquitous computing environments
Journal of King Saud University - Computer and Information Sciences
◽
10.1016/j.jksuci.2011.05.003
◽
2011
◽
Vol 23
(2)
◽
pp. 71-78
◽
Cited By ~ 3
Author(s):
Jalal Al-Muhtadi
◽
Raquel Hill
◽
Sumayah Al-Rwais
Keyword(s):
Access Control
◽
Ubiquitous Computing
◽
Threshold Cryptography
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
A flexible, privacy-preserving authentication framework for ubiquitous computing environments
Proceedings 22nd International Conference on Distributed Computing Systems Workshops
◽
10.1109/icdcsw.2002.1030861
◽
2003
◽
Cited By ~ 26
Author(s):
J. Al-Muhtadi
◽
A. Ranganathan
◽
R. Campbell
◽
M.D. Mickunas
Keyword(s):
Ubiquitous Computing
◽
Privacy Preserving
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
An Ontology-based Framework for Dynamic Resource Management in Ubiquitous Computing Environments
Second International Conference on Embedded Software and Systems (ICESS'05)
◽
10.1109/icess.2005.29
◽
2006
◽
Cited By ~ 3
Author(s):
John Soldatos Ippokratis Pandis
Keyword(s):
Resource Management
◽
Ubiquitous Computing
◽
Dynamic Resource Management
◽
Computing Environments
◽
Dynamic Resource
◽
Ubiquitous Computing Environments
Download Full-text
Service-Oriented Adaptation in Ubiquitous Computing Environments
2009 International Conference on Computational Science and Engineering
◽
10.1109/cse.2009.373
◽
2009
◽
Cited By ~ 3
Author(s):
Kurt Geihs
◽
Roland Reichle
◽
Michael Wagner
◽
Mohammad Ullah Khan
Keyword(s):
Ubiquitous Computing
◽
Service Oriented
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Distributed policy resolution through negotiation in ubiquitous computing environments
10.1109/percom.2009.4912748
◽
2009
◽
Cited By ~ 1
Author(s):
Venkatraman Ramakrishna
◽
Peter Reiher
◽
Leonard Kleinrock
Keyword(s):
Ubiquitous Computing
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
A Security Framework for Blocking New Types of Internet Worms in Ubiquitous Computing Environments
Computational Science and Its Applications – ICCSA 2012 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-31128-4_46
◽
2012
◽
pp. 622-631
Author(s):
Iksu Kim
◽
Yongyun Cho
Keyword(s):
Ubiquitous Computing
◽
Security Framework
◽
Internet Worms
◽
Computing Environments
◽
Ubiquitous Computing Environments
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close