1. Lecture Notes in Computer Science;S. Brands,1994
2. Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Ubicomp 2002,Workshop on Security in Ubiquitous Computing (September 2002)
3. Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. In: 23rd National Information Systems Security Conference (2000)
4. Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart- Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)
5. Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer 24(12), 154–157 (2001)