Computer Science ›› 2008, Vol. 35 ›› Issue (2): 52-57.

Previous Articles     Next Articles

XU Wen-Shuan ,XIN Yun-Wei ,LU Gui-Zhang (College of Information Technical Science, Nankai University, Tianjin 300071)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: In pervasive computing environment, various resources, devices and users are frequently changeable. Servlce providers and requesters commonly do not know each other. Therefore, it becomes an important foundation to identify unknown entities for pervasive

Key words: Pervasive computing, Trust, Trust model

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!