Authentication in Ubiquitous Networking.
Abdullah Mohammed AlmuhaidebBala SrinivasanPublished in: Int. J. Inf. Secur. Priv. (2015)
Keyphrases
- ubiquitous computing
- distributed computing
- peer to peer
- image authentication
- fragile watermarking
- authentication protocol
- authentication mechanism
- authentication scheme
- context awareness
- neural network
- biometric authentication
- ubiquitous environment
- identity authentication
- security analysis
- low cost
- data encryption
- wireless sensor networks
- factor authentication
- information systems