Authenticating pervasive devices with human protocols
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 308 |
---|---|
container_issue | |
container_start_page | 293 |
container_title | |
container_volume | |
creator | JUELS, Ari WEIS, Stephen A |
description | |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis</sourceid><recordid>TN_cdi_pascalfrancis_primary_17414445</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17414445</sourcerecordid><originalsourceid>FETCH-LOGICAL-p115t-c249ce6906bc3b0d8f7aa5ae27ca9202c7102d92b69e20881c1b0a8da9644e8c3</originalsourceid><addsrcrecordid>eNotzMtKxDAUgOHgBazjvEM3Lgs5yUmbLIfBGwy40fVwepraSKctSabi2yvov_l2_4UooAaotEZ3KW61QaksAKorUUgtVeUa1Ddim9Kn_E2DsVIXwuzOefBTDkw5TB_l4uNKKay-7Pwa2KfyK-ShHM4nmsolznnmeUx34rqnMfntvxvx_vjwtn-uDq9PL_vdoVoATK5YoWNfO1m3rFvZ2b4hMuRVw-SUVNyAVJ1Tbe28ktYCQyvJduRqRG9Zb8T933ehxDT2kSYO6bjEcKL4fYQGARGN_gEAUUan</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticating pervasive devices with human protocols</title><source>Springer Books</source><creator>JUELS, Ari ; WEIS, Stephen A</creator><creatorcontrib>JUELS, Ari ; WEIS, Stephen A</creatorcontrib><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540281142</identifier><identifier>ISBN: 9783540281146</identifier><identifier>EISSN: 1611-3349</identifier><language>eng</language><publisher>Berlin: Springer</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Lecture notes in computer science, 2005, p.293-308</ispartof><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,778,782,787,788,4038,4039</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17414445$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>JUELS, Ari</creatorcontrib><creatorcontrib>WEIS, Stephen A</creatorcontrib><title>Authenticating pervasive devices with human protocols</title><title>Lecture notes in computer science</title><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540281142</isbn><isbn>9783540281146</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotzMtKxDAUgOHgBazjvEM3Lgs5yUmbLIfBGwy40fVwepraSKctSabi2yvov_l2_4UooAaotEZ3KW61QaksAKorUUgtVeUa1Ddim9Kn_E2DsVIXwuzOefBTDkw5TB_l4uNKKay-7Pwa2KfyK-ShHM4nmsolznnmeUx34rqnMfntvxvx_vjwtn-uDq9PL_vdoVoATK5YoWNfO1m3rFvZ2b4hMuRVw-SUVNyAVJ1Tbe28ktYCQyvJduRqRG9Zb8T933ehxDT2kSYO6bjEcKL4fYQGARGN_gEAUUan</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>JUELS, Ari</creator><creator>WEIS, Stephen A</creator><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Authenticating pervasive devices with human protocols</title><author>JUELS, Ari ; WEIS, Stephen A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p115t-c249ce6906bc3b0d8f7aa5ae27ca9202c7102d92b69e20881c1b0a8da9644e8c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>JUELS, Ari</creatorcontrib><creatorcontrib>WEIS, Stephen A</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>JUELS, Ari</au><au>WEIS, Stephen A</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticating pervasive devices with human protocols</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>293</spage><epage>308</epage><pages>293-308</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540281142</isbn><isbn>9783540281146</isbn><cop>Berlin</cop><pub>Springer</pub><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2005, p.293-308 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_17414445 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Cryptography Exact sciences and technology Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Signal and communications theory Software Telecommunications and information theory |
title | Authenticating pervasive devices with human protocols |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T09%3A26%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticating%20pervasive%20devices%20with%20human%20protocols&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=JUELS,%20Ari&rft.date=2005&rft.spage=293&rft.epage=308&rft.pages=293-308&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540281142&rft.isbn_list=9783540281146&rft_id=info:doi/&rft_dat=%3Cpascalfrancis%3E17414445%3C/pascalfrancis%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |