-
41
-
42Published 2019Table of Contents: “…Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities…”
Full Text via HEAL-Link
Electronic eBook -
43Published 2017Table of Contents: “… and ubiquitous computing -- 2 Dependable, reliable and autonomic computing -- 3 Security and trust management…”
Full Text via HEAL-Link
Electronic eBook -
44
-
45Published 2006Table of Contents: “… for Systematic Testing -- Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments…”
Full Text via HEAL-Link
Electronic eBook -
46
-
47
-
48
-
49
-
50Published 2007Table of Contents: “… and Ubiquitous Sensor Networks -- Embedded Software Optimization -- Security in Ubiquitous Computing.…”
Full Text via HEAL-Link
Electronic eBook -
51
-
52
-
53
-
54
-
55
-
56by Golding, Paul, 1968-Subjects: “…Ubiquitous computing.…”
Published 2011
Full Text via HEAL-Link
eBook -
57
-
58
-
59
-
60Published 2014Table of Contents: “…Part I Introduction -- A Research Agenda for the Socio-Technical Design of Ubiquitous Computing…”
Full Text via HEAL-Link
Electronic eBook