1 |
IETF RFC 4179, "Using Universal Content Identifier (UCI) as Unifornl Resource Names (URN)", IETF RFC 4179, IETF, 2005
|
2 |
Spyridon Vassilaras et. aI., "Architecture Framework for Device Single Sign On in Personal Area Networks", Lecture Notes in Computer Science, Springer, 2006
|
3 |
TU-T Y.ldMsec, "NGN lDENTITY MANAGEMENT SECURITY", ITU-T Y.ldMsec, ITU-T,2007
|
4 |
B. Schilit, N. Adams, and R. Want., "Context-aware computing applications", IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'94), Santa Cruz, CA, US, pp. 89-101, 1994
DOI
|
5 |
lETF RFC 3761, "The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)", IETF RFC 3761, IETF, 2004
|
6 |
Tae-shik Sohn, et. aI., "Single Sign-On System enabling Mutual Authentication in Multi Domain Environments", KISS Journal, 2001
|
7 |
ITU-T Y. Sup.3, "ITU-T Y.2000 series Supplement on service scenarios for convergence services in a multiple network and application service provider environment ", ITU-T ITU-TY.2000 series YSup.3, ITU-T,2007
|
8 |
Sang-chul Shin, et. aI., "Strategy for international standardization and wide spread of RFlD/USN", KICS Journal, KICS, 2004
|
9 |
Young-gil Kim, 'Data transmission in u-ID sensor network configuration using Bluetooth', ICKIMICS 2004 Proceedings, KIMICS, 2004
|