Modern technology and omnipresent computing and communication facilities are leading us closer to the ubiquitous computing vision. However, the very nature of ubicomp infrastructure, the openness of the environments and the characteristics of the interactions pose unique security and privacy challenges. We anticipate that the vast number of interactions will be unplanned and will occur among mutually unknown and untrusted systems. Mobile components will often find themselves in unfamiliar surroundings, forced to work with infrastructure whose trustworthiness cannot be determined. We must identify and address the security issues inherent in these types of interactions before a large-scale deployment of vulnerable infrastructure begins to pos...
In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be ve...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Some of the most significant security issues arising in the context of ubiquitous mobile computing a...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which...
This paper appears in: Distributed Computing Systems Workshops, 2002. Proceedings. 22nd Internationa...
Handheld devices have become so commonplace nowadays that they are an integral part of our everyday ...
Security and privacy research topics of importance to future mobile systems are reviewed
Mobile devices such as smartphones and tablets are ubiquitous today, and many of them possess signif...
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy ...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile ne...
In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be ve...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Some of the most significant security issues arising in the context of ubiquitous mobile computing a...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which...
This paper appears in: Distributed Computing Systems Workshops, 2002. Proceedings. 22nd Internationa...
Handheld devices have become so commonplace nowadays that they are an integral part of our everyday ...
Security and privacy research topics of importance to future mobile systems are reviewed
Mobile devices such as smartphones and tablets are ubiquitous today, and many of them possess signif...
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy ...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile ne...
In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be ve...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...