共 13 条
[2]
A privacy preserving access control scheme using anonymous identification for ubiquitous environments
[J].
13TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS,
2007,
:482-+
[3]
FERSCHA A, 2003, DATENBANK SPEKTRUM, V7, P48
[5]
Jain R, 2008, INT J DIABETES DEV C, V28, P1, DOI 10.4103/0973-3930.41978
[8]
Nichols R.K., 1998, ICSA GUIDE CRYPTOGRA
[9]
SYVERSON PF, 1994, 1994 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY, PROCEEDINGS, P14
[10]
Tuladhar Summit R., 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08), P249, DOI 10.1109/SUTC.2008.61