References
- Scientific American v.265 no.3 The Computer for the Twentity-First Century Mark Weiser https://doi.org/10.1038/scientificamerican0991-94
- 한국전자통신연구원 주간기술동향 no.1088 유비쿼터스 컴퓨팅과 이지리빙 프로젝트 김완석;백민곤;박태웅;이성국
- 유비쿼터스 IT 혁명과 제3공간 하원규;김동환;최남희
- 한국전자통신연구원 주간기술동향 no.1091 유비쿼터스 무선통신 반도체 소자 기술의 동향 민봉기;심규환;강진영;조경익
- Smart dust
- PACC DARPA
- Security for Ubiquitous Computing Frank Stajano
- IEEE security and Privacy The Resurrecting Duckling: Security Issues for Ubiquitous Computing F.Stajano;R.Anderson
- Workshop on Security in Ubiquitous Computing, 4th international UBICOMP Authentication in Ubiquitous Computing L.Bussard;Y.Roudier
- Operating Systems Review v.32 no.4 A New Family of Authentication Protocols Ross Anderson https://doi.org/10.1145/302350.302353
- Workshop on Security in Ubiquitous Computing, 4th International UBICOMP A Flexible, Privacy Preserving Authentication Framework for Ubiquitous Computing Environments J Al-Muhtadi;A.Ranganathan;R.Campbell;M.D.Mickunas
- Workshop on Security in Ubiquitous Computing, 4th International UBICOMP Secure ubiquitous computing based on entity recognition J.M.Seigneur;S.Farrell;C.D.Jensen
- Workshop on Security in Ubiquitous Computing, 4th International UBICOMP Privacy and Information integrity in Wearable Computing and Ubiquitous Computing J.Falk;S.Bjork
- Proceedings of IEEE Symp. on Res in Security and Privacy Efficient Authentication and Signature of Multicast Streams over Lossy channels A.Perrig;R.Canetti;D.Tygar;D.Dong
- Communication of the ACM v.24 no.11 Password Authentication with Insecure Communication Leslie Lamport https://doi.org/10.1145/358790.358797
- IEEE ICNP Providing robust and ubiquitous security support for mobile ad-hoc networks J.Kong;P.Zerfos;H.Luo;S.Lu;L.Zhang
- 제15회 정보보호와 암호에관한 학술대회(WISC2003) 무선Ad Hoc 네트워크에서 서비스 거부 공격의 위험성 분석 이승형;홍순좌;최헌준
- RFID System, Security & Privacy Implications S.E.Sarma;S.A.Weis;D.W.Engels
- RFID 프라이버스(Japanese) Takagi Hiromitsu