Formal analysis of device authentication applications in ubiquitous computing.
William R. ClaycombDongwan ShinPublished in: SAC (2011)
Keyphrases
- formal analysis
- ubiquitous computing
- ban logic
- smart spaces
- context aware
- ambient intelligence
- everyday life
- context awareness
- physical world
- virtual private network
- physical environment
- pervasive computing
- formal methods
- ubiquitous systems
- context aware computing
- everyday objects
- agent model
- ubiquitous computing environments
- physical objects
- human activities
- natural language
- lightweight
- rfid technology
- security mechanisms
- mobile devices
- communication technologies