Computer Science ›› 2006, Vol. 33 ›› Issue (8): 92-94.
Previous Articles Next Articles
Online:
Published:
Abstract: Users can access resources and obtain services anytime and anywhere in pervasive computing environment. However, the ubiquitous and mobile environment presents a new security challenge. The resource owner and requestor do not foreknow each other. Authenti
Key words: Pervasive computing, Resource-constrained trust negotiation, Authentication
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I8/92
Cited