1 |
Ha, W., et at. 'Confusion of Physical Space and Electronic Space: Ubiquitous IT Revolution and the Third Space', Korean Electronic Times, 2002
|
2 |
G. Banavar and A. Bernstein, 'Software infrastructure and design challenges for ubiquitous computing applications', Communications of the ACM, vol. 45(12), pp. 92-6, 2002
DOI
|
3 |
C. H. Lim, 'Authenticated Key Distributed for Security Services in Open Networks', Future system Technical Report, May 1997
|
4 |
T. Kindberg and A. Fox, 'System Software for Ubiquitous Computing', IEEE Pervasive Computing, January-March, 2002, pp. 70-81
DOI
ScienceOn
|
5 |
Weiser, M., 'The Computer for the Twenty-First Century', Scientific American, vol.256, No. 3, pp. 94-104, September 1991
|
6 |
Kindberg, T. and Zhang, K, 'Validating and Securing Spontaneous Associations between Wireless Devices', Proceedings of 6th Information Security Conference(ISC'03), October 2003
|
7 |
Jalal Al-Muhtadi, Anand Ranganathan, Roy Campbell and M. Dennis Mickunas, 'A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments', Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW'02), 2002
DOI
|
8 |
B. Neumann and T. Ts'o, 'Kerberos: An Authentication Service for Computer Networks', IEEE Communications Magazine, 32(9): 33-38, September 1994
DOI
ScienceOn
|
9 |
Tom Leighton and Silvio Micali, 'Secret-Key Agreement without Public-Key Cryptography', Advances in Cryptology CRYPTO 1993, 456-479, 1994
DOI
|
10 |
권태경, 박해룡, 이철수 '공개키 기반 구조에 기반한 익명게시판 기술 현황' 정보보호학회학술지, 제14권, 제6호, 1-13쪽, 2004년 12월
과학기술학회마을
|
11 |
T. Kwon, J. Cheon, and Y. Kim, 'Anonymous Certificate and its Application', in preparation and available form http://dasan.sejong.ac.kr/-tkwon/research/pseudonym2.pdf, 2004
|
12 |
Kindberg, T. and Zhang, K., 'Secure Spontaneous Device Association', Proceedings of UbiComp 2003: Ubiquitous Computing, vol. 2864 of Lecture Notes in Computer Science, Seattle, WA, USA, October 12-15, 2003. Springer Verlag
|