1LalanaKagal,TimFinin,AnupamJoshi.Trust-based Security in Pervasive Computing Enviroment[J].IEEE Computer,2001.
2Satyanarayanan M.Pervasive computing:vision and challenges[J].IEEE Personal Communications,2001.
3Michael Backes,Dennis Hofheinz.How to break and repair auniversally composable signature functionality[C].Proceedingsof Information Security Conference-ISC LNCS,2004.