Login / Signup
Enabling Secure Ubiquitous Interactions.
Kevin Eustice
Leonard Kleinrock
Shane Markstrum
Gerald J. Popek
Venkatraman Ramakrishna
Peter L. Reiher
Published in:
Middleware Workshops (2003)
Keyphrases
</>
context aware
security requirements
ubiquitous computing
social networks
key distribution
authentication scheme
security management
stream cipher
data encryption
scalar product