Documente Academic
Documente Profesional
Documente Cultură
Trust-Based approach
Roushdat Elaheebocus
School of Electronics and Computer Science
University of Southampton
re1e08@soton.ac.uk
6. References 7. Bibliography
[1] M. Weiser, “The Computer for the 21st Century,” Sci. [14] “Computer Science Essays - Ubiquitous Computing:
Amer., Sept., 1991. Authentication techniques in ubiquitous computing,”
http://www.ukessays.com/essays/computer-
science/ubiquitous-computing.php. Accessed 24 November
2008
[15] Varuna Godara, Handbook of Research on Assessment [17] Anupam Joshi et al., “Security policies and trust in
and Management in Pervasive Computing, 2008. ubiquitous computing,” Philosophical Transactions of the
ISBN:1605662208, 9781605662206. Repository: Google Royal Society A: Mathematical, Physical and Engineering
Books Sciences 366, no. 1881 (October 28, 2008): 3769-3780,
doi:10.1098/rsta.2008.0142.
[16] Tim Kindberg, Abigail Sellen, and Erik Geelhoed,
“Security and Trust in Mobile Interactions: A Study of [18] C.A. Patterson, R.R. Muntz, and C.M. Pancake,
Users’ Perceptions and Reasoning,” in UbiComp 2004: “Challenges in location-aware computing,” Pervasive
Ubiquitous Computing, 2004, 196-213, Computing, IEEE 2, no. 2 (2003): 80-89.
http://www.springerlink.com/content/elj3jeqknr7ffbpb.