[PDF][PDF] Adaptive security schemes based on context and trust for ubiquitous computing environment: A comprehensive survey

G Jagadamba, BS Babu - Indian J. Sci. Technol, 2017 - sciresol.s3.us-east-2.amazonaws …
Objectives: To present the principle of working of some of the widely used adaptive security
schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main …

Password-hashing status

G Hatzivasilis - Cryptography, 2017 - mdpi.com
Computers are used in our everyday activities, with high volumes of users accessing
provided services. One-factor authentication consisting of a username and a password is the …

Digital innovation in the job market: An explorative study on cloud working platforms

A Ruggieri, EM Mosconi, S Poponi… - … : Enabling Platforms and …, 2016 - Springer
The evolution of the web has produced a broad change in partnerships and collaboration
worldwide due to the centrality of internet, a virtual place where actors from different …

[PDF][PDF] Les outils connectés en apiculture: Evaluation de leurs application auprès des apiculteurs français

M Lettmann, MP Chauzat - 2018 - be.anses.fr
Résumé L'effondrement des colonies d'abeilles et plus généralement des populations de
pollinisateurs dans le monde, est un phénomène observé depuis de nombreuses années …

Development of Innovation Acceptance Model for Wearable Computing: A Study of Users' Technology Acceptance in Malaysia

S Mohamad Taib - 2021 - bura.brunel.ac.uk
Wearable computing is becoming a phenomenon of emerging innovation which once
started from the early era of personal computers. Since then, it has grown to sophisticated …

[PDF][PDF] XML Schema Quality Index in the Multimedia Content Publishing Domain

M PUŠNIK, M HERIČKO, B ŠUMAK… - Fifth Workshop on …, 2016 - ceur-ws.org
The structure and content of XML schemas impacts significantly the quality of data
respectively documents, defined by XML schemas. Attempts to evaluate the quality of XML …

[PDF][PDF] Santé animale-alimentation

M Lettmann, MP Chauzat - 2018 - be.anses.fr
Résumé L'effondrement des colonies d'abeilles et plus généralement des populations de
pollinisateurs dans le monde, est un phénomène observé depuis de nombreuses années …

[PDF][PDF] Context and Trust based adaptive security policy: A Survey

J Gȧ, SB BB - researchgate.net
Networks are distributed, and nodes spontaneously move from one network to another to
access service in the ubiquitous computing environments. In these situations, adaptive …

[PDF][PDF] A Secure Versatile Context Aware Framework for Pervasive Computing Environment

A Katiyar, AK Soni, YDS Arya - ijcset.com
Pervasive computing [1] imagines consistent seemless and diversion free application bolster
for everyday user tasks. Accomplishing this requires a high level of computerization. In …

[引用][C] 泛在网络中信息资源管理的国内外研究综述

王娜, 常珍珠 - 图书馆学研究, 2014