Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Muhtadi, J.A., Ranganathan, A., Campbell, R., Mickunas, M.D.: A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: Proc. Of 22nd International Conference on Distributed Computing Systems Workshops (ICDC 2002), pp. 771–776 (2002)
2. Thomas, R.K., Sandhu, R.: Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. In: Proc. Of 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004), pp. 164–170 (2004)
3. Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Proc. Of Workshop on Security in Ubiquitous Computing (Ubicom 2002), pp. 1–5 (2002)
4. Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Proc. of International Symposium on Software Security, pp. 1–15 (2002)
5. Oishi, K., Mambo, M., Okamoto, E.: Anonymous Public Key Certificates and Their Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E81-A(1), 56–64 (1998)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comprehensive Study on VANET Security;Communications in Computer and Information Science;2024
2. Anonymous Identity Authentication scheme for Internet of Vehicles based on moving target Defense;2021 International Conference on Advanced Computing and Endogenous Security;2022-04-21
3. Anonymous Authentication Scheme Based on Trust and Blockchain in VANETs;Algorithms and Architectures for Parallel Processing;2022
4. A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS;2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2021-10
5. RAIAP: renewable authentication on isolated anonymous profiles;Peer-to-Peer Networking and Applications;2020-04-30