期刊文献+
共找到2,040篇文章
< 1 2 102 >
每页显示 20 50 100
Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System
1
作者 Reda Salama Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2917-2932,共16页
In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(... In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%. 展开更多
关键词 Blockchain internet of things ubiquitous computing explainable artificial intelligence CLUSTERING deep learning
下载PDF
Ubiquitous CSCL的概念模型与关键技术要素 被引量:12
2
作者 付道明 徐福荫 《远程教育杂志》 CSSCI 2009年第1期8-12,共5页
以自然、和谐的学习交互环境为主要特征的计算机支持的泛在协作学习(Ubiquitous CSCL)是近年来国内外CSCL研究领域关注的热点。本文通过文献研究、内容分析和归纳演绎等过程,探讨了Ubiquitous CSCL的概念模型、关键交互技术、普适终端... 以自然、和谐的学习交互环境为主要特征的计算机支持的泛在协作学习(Ubiquitous CSCL)是近年来国内外CSCL研究领域关注的热点。本文通过文献研究、内容分析和归纳演绎等过程,探讨了Ubiquitous CSCL的概念模型、关键交互技术、普适终端技术、协作知识建构的基本过程和基于智能空间的交互模型。 展开更多
关键词 普适计算 ubiquitous CSCL 概念模型 关键技术要素
下载PDF
基于Ubiquitous-Joint模型的层状岩坡稳定性分析 被引量:5
3
作者 王曰国 王星华 林杭 《灾害学》 CSCD 2007年第4期46-50,共5页
在应力的作用下,层状岩土体表现出来的力学行为比较复杂,目前广泛使用的各向同性模型不再适用,因此,有必要建立合理描述层状岩质边坡的力学模型。以某公路边坡为工程背景,首先,探讨了层状岩质边坡的失稳机制;然后,利用快速拉格朗日差分... 在应力的作用下,层状岩土体表现出来的力学行为比较复杂,目前广泛使用的各向同性模型不再适用,因此,有必要建立合理描述层状岩质边坡的力学模型。以某公路边坡为工程背景,首先,探讨了层状岩质边坡的失稳机制;然后,利用快速拉格朗日差分法(FLAC3D),建立该边坡的数值分析模型,探讨了强度折减技术在U-biquitous-Joint模型中的实施方法,即对岩体和层理面参数同时进行折减,采用计算不收敛作为边坡临界失稳判据;最后,通过数值计算,分析层状岩质边坡稳定性的影响因素,得到边坡整体安全系数F随节理倾角β先减小后增大,呈现两头高中间低的形态。 展开更多
关键词 层状边坡 稳定性 ubiquitous—Joint模型 强度折减法 失稳判据 影响因素
下载PDF
北京信息化与经济增长——基于ICT资本存量和Ubiquitous指数的分析 被引量:2
4
作者 孙川 《北京行政学院学报》 CSSCI 北大核心 2011年第6期72-78,共7页
信息化对经济增长的影响主要表现在信息化投资和信息化资源利用两个方面,在核算ICT资本存量和建立Ubiquitous指数的基础上,需要将ICT投资和信息化的普及与应用纳入一个统一的框架进行分析。利用ICT增长模型对ICT投资贡献度以及网络外部... 信息化对经济增长的影响主要表现在信息化投资和信息化资源利用两个方面,在核算ICT资本存量和建立Ubiquitous指数的基础上,需要将ICT投资和信息化的普及与应用纳入一个统一的框架进行分析。利用ICT增长模型对ICT投资贡献度以及网络外部性的计量分析表明,ICT投资对北京经济增长发挥了重要作用,ICT投资与普及应用之间的交互作用产生了明显的溢出效应和网络效应,从而进一步增强了ICT对经济增长的影响力。软件投资与硬件投资相比较,软件投资的作用更为显著,对北京经济增长的影响更大。 展开更多
关键词 信息化 经济增长 ICT资本存量 ubiquitous指数
下载PDF
“Ubiquitous”环境下商业展示信息传达与导航界面的应用——基于GUI的导航原型设计的3D要素应用提案
5
作者 马金祥 单秋月 朴釜美 《美术大观》 2011年第8期114-115,共2页
会展业的商业展示中,计算机信息导航是信息传达过程的重要组成部分,通常依赖于界面设计来实现,经历了命令语言界面到图形用户界面(GUI)等发展阶段,适于更优越的人机交互(HCI)及展示信息导航的新概念随着技术环境的改变,必将持续发展。
关键词 ubiquitous 信息导航 界面设计 信息传达 商业 环境 GUI 应用
下载PDF
Study on the Ubiquitous English Learning Environment in Vocational Colleges
6
作者 徐硕雁 《海外英语》 2021年第10期279-280,共2页
Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up an... Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up and formation and development.After entering the 21 st century, new technologies and new ideas have emerged endlessly. The change in learning methods has led to the flip of classroom teaching, and ubiquitous learning has become more known as the pace of social development. The current higher vocational education presents the characteristics of disjointed education content, misaligned learning roles, and single teaching form. The integration of ubiquitous learning environment into vocational education teaching is a new direction for the development of vocational education. 展开更多
关键词 vocational colleges ubiquitous learning ENGLISH ENVIRONMENT RESEARCH
下载PDF
Ubiquitous Learning Environment as a Solution to Education Problem 被引量:5
7
作者 ZHAO Hailan Jung-Hwan Park 《开放教育研究》 CSSCI 2006年第4期61-66,共6页
Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method... Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method of learning the information through the internet or studying at specific place,such as school or library,and so on.People do not need to go to specific place at specific time to access the information that they want,but the learning information finds its way to people,which is the biggest difference from the existing method. Ubiquitous learning aims to solve current problems of education in more creative and learner-oriented way by creating an education environment where learners can learn with any terminal anytime and anywhere without regard to contents.The presentation this time would help promote the understanding of the Ubiquitous and explore the ubiquitous education environment that is capable of solving overall problems of education.In addition,it will propose a direction of ubiquitous learning scenario and the change in the educational environment. 展开更多
关键词 ubiquitous ubiquitous Learning U-LEARNING
下载PDF
Ubiquitous环境下高校图书馆空间布局模型研究——以韩国延世大学三星图书馆为例 被引量:3
8
作者 李苗 《科技情报开发与经济》 2014年第9期155-158,共4页
介绍了韩国延世大学新建的三星图书馆的整体空间布局情况以及人性化服务,以期对我国图书馆有所启示。
关键词 ubiquitous环境 高校图书馆 空间布局模型 信息共享空间 韩国延世大学三星图书馆
下载PDF
Long term integration of radar signals with unknown Doppler shift for ubiquitous radar 被引量:4
9
作者 Qinglong Bao Zengping Chen Yue Zhang Jian Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期219-227,共9页
Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range target... Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range targets impacts selection of waveform parameters. The coherent processing interval (CPI) must be long enough to achieve a certain signal-to-noise ratio (SNR) that ensures the efficiency of detection. The condition of detection in the case of low SNR is analyzed, and three different cases that would occur during integration are discussed and a method to determine the CPI is presented. The simulation results show that targets detection with SNR as low as -26 dB in the experimental system can possibly determine the CPI. 展开更多
关键词 ubiquitous radar low signal-to-noise ratio (SNR) coherent processing interval (CPI) coherent integration non-coherent integration.
下载PDF
Development of Ubiquitous Simulation Service Structure Based on High Performance Computing Technologies 被引量:2
10
作者 Sang-Hyun CHO Jeong-Kil CHOI 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2008年第3期374-378,共5页
The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that ... The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs. 展开更多
关键词 Parallel computation Message passing interface (MPI) Shared memory processing (SMP) CLUSTERING ubiquitous
下载PDF
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
11
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
下载PDF
Mobile Ubiquitous Service Environment 被引量:12
12
作者 Zhang Ping,Ji Yang,Feng Zhiyong (Research Center for Wireless New Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China) The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform. 《ZTE Communications》 2007年第2期58-60,共3页
The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the m... The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform. 展开更多
关键词 Mobile ubiquitous Service Environment GPP
下载PDF
Evolution Toward Artificial Intelligence of Things Under 6G Ubiquitous⁃X 被引量:4
13
作者 Ping Zhang Xiaodong Xu +3 位作者 Xiaoqi Qin Yiming Liu Nan Ma Shujun Han 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2020年第3期116-135,共20页
With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mob... With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mobile society.Genie,which can act as the artificial intelligence assistance for 6G users,is the key enabler to realize the unprecedented transformation from mobile Internet to network of intelligence.While Internet of Things(IoT)is the digital nervous system,genie acts like the brain of the overall system.Supported by 6G,IoT will step into the Artificial Intelligence of Things(AIoT)era and the AIoT networks have the abilities of intelligent perception,intelligent analysis,and intelligent control.In this paper,the concept of Ubiquitous⁃X is introduced,which is considered as the fundamental architecture of 6G network,and the definition and architecture of AIoT under Ubiquitous⁃X is also presented.Several major technical challenges posed by the service requirements of novel AIoT applications are pinpointed,including massive and intelligent connectivity,efficient computing,security,privacy,authentication,high scalability and efficiency.Potential enabling technologies to support seamless service experiences across terminals to realize AIoT are introduced as well. 展开更多
关键词 AIoT 6G ubiquitous⁃X AI MEC blockchain physical layer security
下载PDF
Architecture design and demand analysis on application layer of standard system for ubiquitous power Internet of Things 被引量:4
14
作者 Jing Zhang Yunying Ye +1 位作者 Chunjin Hu Bin Li 《Global Energy Interconnection》 EI CAS CSCD 2021年第3期304-314,共11页
The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power syst... The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work. 展开更多
关键词 ubiquitous power Internet of Things(UPIoT) Application layer Standard system Architecture design Demand analysis
下载PDF
Revealing the Ubiquitous Effects of Quantum Entanglement—Toward a Notion of God Logic 被引量:1
15
作者 Wen-Ran Zhang Karl E. Peace 《Journal of Quantum Information Science》 2013年第4期143-153,共11页
Following Spinoza-Einstein’s interpretation of God or nature, the notion “God Logic” is proposed. This notion is to serve as an elicitation for a consistent set of necessary criteria for: 1) developing the logical ... Following Spinoza-Einstein’s interpretation of God or nature, the notion “God Logic” is proposed. This notion is to serve as an elicitation for a consistent set of necessary criteria for: 1) developing the logical foundation of quantum gravity as envisaged by Einstein, 2) revealing the ubiquitous effects of quantum entanglement as suggested by Roger Penrose, and 3) programming the universe as proposed by Seth Lloyd. An evolving set of eleven criteria is proposed for the notion. The possibility of inventing such a logical system is analyzed. A supersymmetrical candidate logic of negative-positive energy dynamic equilibrium is introduced and assessed against the set of criteria. It is shown that the first 10 criteria are met or partially met by the candidate. But the question whether the 11th criterion has been or can be met is left open for discussion and further research effort. The assessment leads to a few predictions. Notably, it is predicted that, should Boson-Fermion symmetry or broken symmetry be observed, it would be caused by bipolar symmetry or broken symmetry of negative-positive energies. 展开更多
关键词 ubiquitous EFFECTS of QUANTUM Entanglement Programming the Universe Negative-Positive Energy SUPERSYMMETRY Scientific Unification ubiquitous QUANTUM Computing QUANTUM Intelligence
下载PDF
Knowledge Fusion and Synchronization over Ubiquitous Ontology Mapping 被引量:1
16
作者 Hang Qin Li Zhu 《Journal of Computer and Communications》 2017年第10期1-9,共9页
With the rapid development and popularization of web services, the available information types and structure are becoming more and more complex and challenging. Actually web services involve the need for dynamic integ... With the rapid development and popularization of web services, the available information types and structure are becoming more and more complex and challenging. Actually web services involve the need for dynamic integration and transparent knowledge integration, in light of the urgent information changing track. Under this situation, the traditional search engine and information integration cannot finish this challenge, thereby bringing the opportunity for knowledge fusion and synchronization. This paper proposes a multi-matching strategy ontology mapping method for web information, i.e., ubiquitous ontology mapping method (U-Mapping), which can be viewed as a base collection of information on multiple ontologies made to appear anytime and everywhere. This approach is usually built independently by different information providers, avoiding the grammatical and semantic conflict. Finally, the ontology case information can be utilized under the consolidation of the U-Mapping, concerning language technology and machine learning methods. 展开更多
关键词 ubiquitous Ontology Mapping KNOWLEDGE FUSION Information Integration KNOWLEDGE SYNCHRONIZATION CONCEPTUAL Space FUSION RULES
下载PDF
“Ubiquitous”日近,测绘如何前行 被引量:1
17
作者 孙颖 王世军 《测绘与空间地理信息》 2013年第4期55-56,共2页
随着互联网络的发展、移动定位设备的普及,定位、地图已经不仅仅应用于基础建设、国防安全等领域,越来越多地向生活的方方面面渗透,任何人都可以提供与空间相关的信息,也可以享受公众地图带来的服务,使得测绘活动和测绘成果无所不在,这... 随着互联网络的发展、移动定位设备的普及,定位、地图已经不仅仅应用于基础建设、国防安全等领域,越来越多地向生活的方方面面渗透,任何人都可以提供与空间相关的信息,也可以享受公众地图带来的服务,使得测绘活动和测绘成果无所不在,这就是泛在测绘和泛在地图现象。 展开更多
关键词 ubiquitous 泛在测绘 泛在地图
下载PDF
An Indoor Ubiquitous Computing Environment Based on Location-awareness 被引量:1
18
作者 蒲芳 孙道清 +2 位作者 曹奇英 蔡海滨 李永宁 《Journal of Donghua University(English Edition)》 EI CAS 2006年第4期76-79,共4页
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU... To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA. 展开更多
关键词 ubiquitous computing location awareness middleware.
下载PDF
UTILITY OPTIMIZATION SCHEDULING FOR MULTI-POINT VIDEO SURVEILLANCE IN UBIQUITOUS NETWORK 被引量:1
19
作者 Zhang Chen Huang Liusheng Xu Hongli 《Journal of Electronics(China)》 2013年第1期1-8,共8页
Resource allocation is an important problem in ubiquitous network. Most of the existing resource allocation methods considering only wireless networks are not suitable for the ubiquitous network environment, and they ... Resource allocation is an important problem in ubiquitous network. Most of the existing resource allocation methods considering only wireless networks are not suitable for the ubiquitous network environment, and they will harm the interest of individual users with instable resource requirements. This paper considers the multi-point video surveillance scenarios in a complex network environment with both wired and wireless networks. We introduce the utility estimated by the total costs of an individual network user. The problem is studied through mathematical modeling and we propose an improved problem-specific branch-and-cut algorithm to solve it. The algorithm follows the divide-and-conquer principle and fully considers the duality feature of network selection. The experiment is conducted by simulation through C and Lingo. And it shows that compared with a centralized random allocation scheme and a cost greed allocation scheme, the proposed scheme has better per- formance of reducing the total costs by 13.0% and 30.6% respectively for the user. 展开更多
关键词 ubiquitous network Multi-point video surveillance Resource allocation
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
20
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
上一页 1 2 102 下一页 到第
使用帮助 返回顶部