Multiple trusted devices authentication protocol for ubiquitous computing applications.
Kamarularifin Abd. JalilQatrunnada Binti Abdul RahmanPublished in: CyberSec (2012)
Keyphrases
- ubiquitous computing
- authentication protocol
- context aware
- physical world
- computing devices
- ambient intelligence
- ubiquitous systems
- ubiquitous computing environments
- everyday objects
- context awareness
- smart spaces
- ubiquitous environment
- physical objects
- communication technologies
- mobile devices
- context aware computing
- smart objects
- intelligent environments
- human activities
- security protocols
- pervasive computing
- rfid tags
- lightweight
- information systems
- security analysis
- real time
- computing systems
- end to end
- wireless sensor networks