RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Alexei CzeskisKarl KoscherJoshua R. SmithTadayoshi KohnoPublished in: CCS (2008)
Keyphrases
- context aware
- secret information
- ddos attacks
- contextual information
- watermarking technique
- context awareness
- mobile devices
- ubiquitous computing
- ambient intelligence
- mobile users
- context aware systems
- digital content
- mobile computing
- mobile environments
- ubiquitous learning
- secret data
- data hiding
- smart environments
- context aware ubiquitous learning
- smart spaces
- watermarking scheme
- multimedia content
- communication networks
- artificial intelligence
- information hiding
- smart home
- mobile applications
- context aware computing
- context aware preferences
- watermarking algorithm
- ubiquitous environment
- multimedia