Supported by the Ministry of Educationin China (No.104086)
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...
Supported by the Ministry of Educationin China(No.104086)
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne...