![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2023
- Abhijit Kumar, Tauseef Ahmed, Konica Saini, Jay Kumar:
NEOS: Non-intrusive Edge Observability stack based on Zero Trust security model for Ubiquitous Computing. EDGE 2023: 79-84 - 2021
- Apostolos P. Fournaris, Athanassios Moschos, Nicolas Sklavos
:
Side Channel Assessment Platforms and Tools for Ubiquitous Systems. Security of Ubiquitous Computing Systems 2021: 147-163 - Miroslaw Kutylowski, Piotr Syga
, Moti Yung:
Emerging Security Challenges for Ubiquitous Devices. Security of Ubiquitous Computing Systems 2021: 3-18 - Vasily Mikhalev, Miodrag J. Mihaljevic, Orhun Kara
, Frederik Armknecht:
Selected Design and Analysis Techniques for Contemporary Symmetric Encryption. Security of Ubiquitous Computing Systems 2021: 49-62 - Sasa Mrdovic:
IoT Forensics. Security of Ubiquitous Computing Systems 2021: 215-229 - 2020
- Guojun Wang, Jianhua Ma, Laurence T. Yang:
Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications. Inf. Sci. 522: 317-318 (2020) - 2019
- Joonsang Baek, Willy Susilo
, Jongkil Kim
:
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(1): 1-3 (2019) - 2018
- Seongkee Lee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, Hoon-Kyu Kim:
Resiliency of mobile OS security for secure personal ubiquitous computing. Pers. Ubiquitous Comput. 22(1): 23-34 (2018) - 2016
- James Jong Hyuk Park
, Wanlei Zhou
:
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing. Entropy 18(9): 334 (2016) - G. Jagadamba, B. Sathish Babu:
Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment. Int. J. Syst. Serv. Oriented Eng. 6(4): 1-21 (2016) - 2014
- Marek R. Ogiela, Aniello Castiglione
, Ilsun You:
Soft computing for security services in smart and ubiquitous environments. Soft Comput. 18(9): 1655-1658 (2014) - Stefan Kaufmann:
Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication. Automotive - Safety & Security 2014: 95-108 - 2013
- Meikang Qiu, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin, Laurence T. Yang:
Security-aware optimization for ubiquitous computing systems with SEAT graph approach. J. Comput. Syst. Sci. 79(5): 518-529 (2013) - Jongsung Kim, Jiqiang Lu, Ching-Hsien Hsu:
Advanced security technologies and applications for ubiquitous computing. Pers. Ubiquitous Comput. 17(5): 835-836 (2013) - 2012
- Iksu Kim, Yongyun Cho
:
A Security Framework for Blocking New Types of Internet Worms in Ubiquitous Computing Environments. ICCSA (4) 2012: 622-631 - Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - Frank Stajano:
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion). Security Protocols Workshop 2012: 231-241 - Oliver Stannard, Frank Stajano:
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. Security Protocols Workshop 2012: 223-230 - 2011
- Jessie J. Walker
, Travis Jones, Mansour Mortazavi, Roy Blount:
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments. CyberC 2011: 274-278 - Mohamed Hilia, Abdelghani Chibani, Yacine Amirat, Karim Djouani
:
Cross-Organizational Cooperation Framework for Security Management in Ubiquitous Computing Environment. ICTAI 2011: 464-471 - Bruce Davis:
Signal rich art: enabling the vision of ubiquitous computing. Media Forensics and Security 2011: 788002 - 2009
- Cheol-Joo Chae, Hyo Young Shin, Jae-Kwang Lee:
A Security Framework for Ubiquitous Computing Environment. J. Inform. and Commun. Convergence Engineering 7(3): 330-334 (2009) - Sungdo Park, Bokman Jang, Hyokyung Chang, Bong-hoi Kim, Eui-In Choi:
Rule-Based Auditing System for Security Assurance in Ubiquitous Computing. Security and Management 2009: 485-489 - 2008
- Azzedine Boukerche, Yonglin Ren:
A trust-based security system for ubiquitous and pervasive computing environments. Comput. Commun. 31(18): 4343-4351 (2008) - Stephen S. Yau, Zhaoji Chen:
Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments. UIC 2008: 3-19 - Volkmar Lotz, Luca Compagna, Konrad S. Wrona:
Towards Adaptive Security for Ubiquitous Computing Systems. Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises 2008: 574-584 - Tobias Straub, Andreas Heinemann:
Security for Ubiquitous Computing. Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises 2008: 337-362 - 2007
- Mohammed Zia Hayat:
Information Security Risk Management for Ubiquitous Computing. University of Southampton, UK, 2007 - Zia Hayat, Jeff Reeve, Chris Boutle:
Ubiquitous security for ubiquitous computing. Inf. Secur. Tech. Rep. 12(3): 172-178 (2007) - Hyun Seok Kim, Jin-Young Choi
:
Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing. ICCCN 2007: 1359-1363
skipping 18 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-26 11:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint