Abstract. This paper explores computer security in pervasive computing with focus on user authentication. We present the concept of Proximity-Based User Authentication, as a usability-wise ideal for UbiComp systems. We present a context-aware user authentication protocol, which (1) uses a JavaCard for identi-fication and cryptographic calculations, (2) uses a context-awareness system for verifying the user’s location, and (3) implements a security fall-back strategy. We analyze the security of this protocol and discuss the tradeoff between usabil-ity and security. We also present our current implementation of the protocol and discuss future work.
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in d...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
In this paper we discuss the possibilities of context-aware systems in providing more secure user au...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
The necessity of verifying user identity is a crucial element of any system to avoid potential ident...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
The necessity of verifying user identity is a crucial element of any system to avoid potential ident...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
Abstract In pervasive computing environments (PCEs), privacy and security are two important but cont...
In smart environments, pervasive computing contributes significantly in improving daily life activit...
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterog...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
Context-aware user authentication has become a necessary tool to serve as an additional security per...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in d...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
In this paper we discuss the possibilities of context-aware systems in providing more secure user au...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
The necessity of verifying user identity is a crucial element of any system to avoid potential ident...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
The necessity of verifying user identity is a crucial element of any system to avoid potential ident...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
Abstract In pervasive computing environments (PCEs), privacy and security are two important but cont...
In smart environments, pervasive computing contributes significantly in improving daily life activit...
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterog...
AbstractThis paper addresses the design of architectures for proximity-aware services with unobtrusi...
Context-aware user authentication has become a necessary tool to serve as an additional security per...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in d...