Securing admission control in ubiquitous computing environment

JP Yang, KH Rhee - Networking-ICN 2005: 4th International Conference …, 2005 - Springer
In this paper, we introduce a new model which allows an organization to perform secure
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …

Securing admission control in ubiquitous computing environment

JP Yang, KH Rhee - Proceedings of the 4th international conference on …, 2005 - dl.acm.org
In this paper, we introduce a new model which allows an organization to perform secure
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …

[CITATION][C] Securing admission control in ubiquitous computing environment

JP YANG, KH RHEE - Lecture notes in computer science, 2005 - pascal-francis.inist.fr
Securing admission control in ubiquitous computing environment CNRS Inist Pascal-Francis
CNRS Pascal and Francis Bibliographic Databases Simple search Advanced search Search by …

Securing Admission Control in Ubiquitous Computing Environment

JP Yang, KH Rhee - Networking-ICN 2005 - infona.pl
In this paper, we introduce a new model which allows an organization to perform secure
admission control for foreign users. We adopt a threshold proxy signature scheme to provide …

[CITATION][C] Securing admission control in ubiquitous computing environment

JP YANG, KH RHEE - Lecture notes in computer science, 2005 - Springer

[CITATION][C] Securing Admission Control in Ubiquitous Computing Environment

JP Yang, K Rhee - Networking-ICN 2005, 2005 - Springer