Securing admission control in ubiquitous computing environment
JP Yang, KH Rhee - Networking-ICN 2005: 4th International Conference …, 2005 - Springer
In this paper, we introduce a new model which allows an organization to perform secure
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …
Securing admission control in ubiquitous computing environment
JP Yang, KH Rhee - Proceedings of the 4th international conference on …, 2005 - dl.acm.org
In this paper, we introduce a new model which allows an organization to perform secure
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …
[CITATION][C] Securing admission control in ubiquitous computing environment
JP YANG, KH RHEE - Lecture notes in computer science, 2005 - pascal-francis.inist.fr
Securing admission control in ubiquitous computing environment CNRS Inist Pascal-Francis
CNRS Pascal and Francis Bibliographic Databases Simple search Advanced search Search by …
CNRS Pascal and Francis Bibliographic Databases Simple search Advanced search Search by …
Securing Admission Control in Ubiquitous Computing Environment
JP Yang, KH Rhee - Networking-ICN 2005 - infona.pl
In this paper, we introduce a new model which allows an organization to perform secure
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …
[CITATION][C] Securing admission control in ubiquitous computing environment
JP YANG, KH RHEE - Lecture notes in computer science, 2005 - Springer
[CITATION][C] Securing Admission Control in Ubiquitous Computing Environment
JP Yang, K Rhee - Networking-ICN 2005, 2005 - Springer