Secure Pervasive Computing without a Trusted Third Party.
Asad Amir PirzadaChris McDonaldPublished in: ICPS (2004)
Keyphrases
- trusted third party
- pervasive computing
- digital signature
- third party
- ambient intelligence
- credit card
- daily life
- context awareness
- mobile devices
- security services
- service discovery
- computing environments
- mobile computing
- smart environments
- context aware
- privacy protection
- authentication protocol
- key distribution
- ubiquitous computing
- smart card
- intelligent environments
- intelligent systems
- public key
- security mechanisms
- key management
- security analysis
- database
- elliptic curve
- digital libraries
- databases