Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is di#cult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated can not experience the same context and can thus not benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other...
Infrastructureless networks are becoming more popular with the increased prevalence of wireless netw...
Abstract. This paper explores computer security in pervasive computing with focus on user authentica...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
Context-aware computing has been a rapidly growing research area, however its uses have been predomi...
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computin...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to ...
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterog...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
Modern systems are increasingly dependent on the integration of physical processes and information t...
Infrastructureless networks are becoming more popular with the increased prevalence of wireless netw...
Abstract. This paper explores computer security in pervasive computing with focus on user authentica...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
Rapid advances in computing technology have made it possible to create a pervasive computing environ...
Context-aware computing has been a rapidly growing research area, however its uses have been predomi...
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computin...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to ...
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterog...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
Modern systems are increasingly dependent on the integration of physical processes and information t...
Infrastructureless networks are becoming more popular with the increased prevalence of wireless netw...
Abstract. This paper explores computer security in pervasive computing with focus on user authentica...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require...