
Security middleware approaches and issues for ubiquitous applications
Keywords: شبکههای بیسیم ادهاک ; Ubiquitous computing; Pervasive environments; Security middleware; Authentication; Ad hoc networks; P2P systems