Computer Science ›› 2006, Vol. 33 ›› Issue (8): 92-94.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: Users can access resources and obtain services anytime and anywhere in pervasive computing environment. However, the ubiquitous and mobile environment presents a new security challenge. The resource owner and requestor do not foreknow each other. Authenti

Key words: Pervasive computing, Resource-constrained trust negotiation, Authentication

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!