유비쿼터스 컴퓨팅 보안

  • 발행 : 2003.05.01

초록

키워드

참고문헌

  1. 유비쿼터스 윤정로(역);최장욱(역)
  2. The Resurrecting Duckling: Security Issues for Ubiquitous Computing F. Stajano;R. Anderson
  3. first Security & Privacy supplement to IEEE Computer no.first Security & Privacy suppl. Security for Ubiquitous Computing F. Stajano
  4. Cryptobytes v.5 no.2 RSA Laboratories The TESLA Broadcast Authentication Protool A. Perrig;R. Canetti;J. D. Tygar;D. Song
  5. Operating Systems Review v.32 no.4 A new family of authentication protocols R. J. Anderson;F. Bergadano;B. Crispo;J. H. Lee;C. Manifavas;R. M. Needlham
  6. Proceedings of NDSS'99 Client Puzzles:A Cryptographic Defense Against Connection Depletion Attacks A. Juels;J. Brainard
  7. UBICOMP2002 Structured Analysis of Security in Ubiquitous Computing R. Zimmer
  8. EURESCOM Technical Information P1005 Operator specific security requirements for ubiquitous computing F. Vieira;J. Bonnet;C. Loba;R. Schmitz;P. Windrisch;C. Byrne;T. Wall
  9. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 On Trust for Ubiquitous Computing N. Shankar;W. Arbaugh
  10. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Secure Ubiquitous Computing based on Entity Recognition J. Seigneur
  11. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Integrating Privacy Enhancing Services in Ubiquitous Computing Environments M. Wu;A. Friday
  12. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Authentication in Ubiquitous Computing L. Bussard;Y. Roudier
  13. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Identity Management M. Kreutzer
  14. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Enabling Secure Ad-hoc Communication using Context-Aware Security in Ubiquitous Computing N. Shankar;D. Bilfanz
  15. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Protecting People Location Information U. Hengartner;P. Steenkiste
  16. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Threats, Risk Assessment and Policy Management in UbiComp Philip Robinson
  17. Workshop on Security in Ubiquitous Computing, UBICOMP 2002 A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions Hakan Kvarnstrom
  18. Communications of the ACM v.21 no.12 Using Encryption for Authentication in Large Networks of Computers R. M. Needham;M. D. Shroeder
  19. Public-Key Infrastruture (X.509) (pkix)
  20. 시사컴퓨터 no.12월 IPSec VPN의 현재 그리고 미래 엄봉식
  21. ETRI, 최종연구보고서 무선 인터넷 기반의 인증 및 키 교환 프로토콜에 관한 연구
  22. 무선랜보안 김상철