Search results for: Michael Goldsmith
IEEE Systems Journal > 2017 > 11 > 2 > 503 - 512
Lecture Notes in Computer Science > Security in Pervasive Computing > Authentication and Trust > 116-129
2016 IEEE Security and Privacy Workshops (SPW) > 286 - 295
Lecture Notes in Computer Science > Applied Formal Methods — FM-Trends 98 > Regular Papers > 243-250
Lecture Notes in Computer Science > Communicating Sequential Processes. The First 25 Years > Automated Development and Model Checking > 265-274
Lecture Notes in Computer Science > Security in Pervasive Computing > Session 5: Authentication (III) > 119-133
Lecture Notes in Computer Science > Formal Methods and Software Engineering > Verification 2 > 258-277
The International Series in Engineering and Computer Science > Privacy, Security and Trust within the Context of Pervasive Computing > Secure Trust Models and Management in Pervasive Computing > 83-91
IFIP — The International Federation for Information Processing > Privacy and Identity Management for Life > Privacy Policies > 271-282
IFIP — The International Federation for Information Processing > Privacy and Identity Management for Life > Privacy Policies > 258-270
IFIP — The International Federation for Information Processing > Privacy and Identity Management for Life > Identity Management and Multilateral Security > 246-258
Security Informatics > 2016 > 5 > 1 > 1-14