Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Distributed systems (3rd ed.): concepts and design
Distributed systems (3rd ed.): concepts and design
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
DEAPspace: transient ad hoc networking of prevasive devices
Computer Networks: The International Journal of Computer and Telecommunications Networking - pervasive computing
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Using handhelds and PCs together
Communications of the ACM
People, places, things: web presence for the real world
Mobile Networks and Applications
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Addressing the shortcomings of one-way chains
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
The Journal of Strategic Information Systems
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
A privacy-preserving UBICOMP architecture
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
Some security issues of wireless systems
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Hi-index | 0.00 |
The distinguished capabilities of these devices are also the very reasons they require security and privacy protections of an unprecedented scale.