Authenticating pervasive devices with human protocols

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: JUELS, Ari, WEIS, Stephen A
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 308
container_issue
container_start_page 293
container_title
container_volume
creator JUELS, Ari
WEIS, Stephen A
description
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis</sourceid><recordid>TN_cdi_pascalfrancis_primary_17414445</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17414445</sourcerecordid><originalsourceid>FETCH-LOGICAL-p115t-c249ce6906bc3b0d8f7aa5ae27ca9202c7102d92b69e20881c1b0a8da9644e8c3</originalsourceid><addsrcrecordid>eNotzMtKxDAUgOHgBazjvEM3Lgs5yUmbLIfBGwy40fVwepraSKctSabi2yvov_l2_4UooAaotEZ3KW61QaksAKorUUgtVeUa1Ddim9Kn_E2DsVIXwuzOefBTDkw5TB_l4uNKKay-7Pwa2KfyK-ShHM4nmsolznnmeUx34rqnMfntvxvx_vjwtn-uDq9PL_vdoVoATK5YoWNfO1m3rFvZ2b4hMuRVw-SUVNyAVJ1Tbe28ktYCQyvJduRqRG9Zb8T933ehxDT2kSYO6bjEcKL4fYQGARGN_gEAUUan</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticating pervasive devices with human protocols</title><source>Springer Books</source><creator>JUELS, Ari ; WEIS, Stephen A</creator><creatorcontrib>JUELS, Ari ; WEIS, Stephen A</creatorcontrib><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540281142</identifier><identifier>ISBN: 9783540281146</identifier><identifier>EISSN: 1611-3349</identifier><language>eng</language><publisher>Berlin: Springer</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Lecture notes in computer science, 2005, p.293-308</ispartof><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,778,782,787,788,4038,4039</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17414445$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>JUELS, Ari</creatorcontrib><creatorcontrib>WEIS, Stephen A</creatorcontrib><title>Authenticating pervasive devices with human protocols</title><title>Lecture notes in computer science</title><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540281142</isbn><isbn>9783540281146</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotzMtKxDAUgOHgBazjvEM3Lgs5yUmbLIfBGwy40fVwepraSKctSabi2yvov_l2_4UooAaotEZ3KW61QaksAKorUUgtVeUa1Ddim9Kn_E2DsVIXwuzOefBTDkw5TB_l4uNKKay-7Pwa2KfyK-ShHM4nmsolznnmeUx34rqnMfntvxvx_vjwtn-uDq9PL_vdoVoATK5YoWNfO1m3rFvZ2b4hMuRVw-SUVNyAVJ1Tbe28ktYCQyvJduRqRG9Zb8T933ehxDT2kSYO6bjEcKL4fYQGARGN_gEAUUan</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>JUELS, Ari</creator><creator>WEIS, Stephen A</creator><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Authenticating pervasive devices with human protocols</title><author>JUELS, Ari ; WEIS, Stephen A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p115t-c249ce6906bc3b0d8f7aa5ae27ca9202c7102d92b69e20881c1b0a8da9644e8c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>JUELS, Ari</creatorcontrib><creatorcontrib>WEIS, Stephen A</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>JUELS, Ari</au><au>WEIS, Stephen A</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticating pervasive devices with human protocols</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>293</spage><epage>308</epage><pages>293-308</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540281142</isbn><isbn>9783540281146</isbn><cop>Berlin</cop><pub>Springer</pub><tpages>16</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2005, p.293-308
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17414445
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Cryptography
Exact sciences and technology
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Signal and communications theory
Software
Telecommunications and information theory
title Authenticating pervasive devices with human protocols
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T09%3A26%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticating%20pervasive%20devices%20with%20human%20protocols&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=JUELS,%20Ari&rft.date=2005&rft.spage=293&rft.epage=308&rft.pages=293-308&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540281142&rft.isbn_list=9783540281146&rft_id=info:doi/&rft_dat=%3Cpascalfrancis%3E17414445%3C/pascalfrancis%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true