3[1]A K Dey,G D Abowd.Towards a better understanding of context and context-awareness.College of Computing Georgia Institute of Technology,Tech Rep:GIT-GVU-99-22,1999 被引量:1
4[2]Arnoud ten Hoedt.Context-aware mobile health applications.http://referaat.ewi.utwente.nl/documents/2006_ 04_ B-Context_ aware_ Services_ and Applications/2006_ 04_ B_ Hoedt,%20A.B.M.-Context-Aware_ Mobile_ Htalth_ Application.pdf,2006-04 被引量:1
5[7]S Goldwasser,S Micali,C Rackoff.The knowledge complexity of interactive proof systems.SIAM Journal of Computer,1989,(18):186-208 被引量:1
6[11]M Blum,P Feldman,S Micali.Non-interactive zero knowledge proof systems and applications.The 20th Annual ACM Symp on Theory of Computing,Chicago,IL,1988 被引量:1
7[17]Jakob E Bardram,Rasmus E Kjr,Michael Pedersen.Context-aware user authentication-supporting proximity-based login in pervasive computing.http://www.daimi.au.dk/~bardram/docs/bardram.ubicomp2003.pdf,2003-10 被引量:1
8[18]Adrian Friday,Maomao Wu,Joe Finney,et al.Network layer access control for context-aware IPv6 applications.http://www.comp.lancs.ac.uk/~adrian/Papers/frIDay-v6accesscontrol-winet03.pdf,2004-04 被引量:1