Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference24 articles.
1. Are estimote beacons secure? How does secure UUID work?
https://community.estimote.com/hc/en-us/articles/201371053
. Accessed 24 Oct 2017
2. Arthur W, Challener D (2015) A practical guide to TPM 2.0: using the trusted platform module in the new age of security. Apress, New York
3. Bahl P, Padmanabhan VN (2000) RADAR: an in-building RF-based user location and tracking system. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOMM ‘00). Proceedings IEEE 2(2000):775–784
4. Biehl JT, Cooper M, Filby G, Kratz S (2014) LoCo: a ready-to-deploy framework for efficient room localization using Wi-Fi, Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing. Seattle, Washington.
https://doi.org/10.1145/2632048.2636083
5. Biehl JT, Lee AJ, Filby G, Cooper M (2015) You’re where? prove it!: towards trusted indoor location estimation of mobile devices. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). ACM, New York, pp 909–919.
https://doi.org/10.1145/2750858.2804284
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献