Publisher
Springer Science and Business Media LLC
Reference10 articles.
1. Pirzada A A, McDonald C. Kerberos Assisted Authentication in Mobile Ad-hoc Networks. Castro EV, Ed.,The 27th conference on Australasian Computer Science, New Zealand, Dunedin; 2004,26: 41–46.
2. Blake-Wilson S, Nystrom M, Hopwood D,et al. Transport Layer Security (TLS) Extensions.IETF RFC 3546,June 2003,http://www.faqs.org/rfcs.
3. Balfanz D, Smetters D K, Stewart P,et al. Talking to strangers: authentication in Ad-hoc wireless networks.The 9th Annual Network and Distributed System Security Symposium. San Diego: California, 2002.
4. Bussard L, Roudier Y, Molva R. Untraceable Secret Credentials: Trust Establishment with Privacy.The Second IEEE Annual Conference on Pervasive Computing and Communications Workshops Orlando: Florida, 2004, 122–126.
5. Corradi A, Montanari R, Tibaldi D. Context-Driven Adaptation of Trust Relationships in Pervasive Collaborative Environments.The 2005 Symposium on Applications and the Internet Workshops (SAINT-W'05). Trento: Italy, 2005. 178–181.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Preserving the Privacy of Patient Records in Health Monitoring Systems;Theory and Practice of Cryptography Solutions for Secure Information Systems;2013