Chris J. Mitchell and Hu, S. Secure zero configuration in a ubiquitous computing environment.
Full text access: Open
In this paper, we discuss the need for zero configuration in a ubiquitous environment. Security issues in ubiquitous environment are identified, and future research directions are outlined.
This is a version This version's date is: This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/8328e6a1-6620-ae8f-1ad7-45330810fc2e/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010