Multi-modal authentication for ubiquitous computing environments

  • Authors:
  • Taekyoung Kwon;Sang-Ho Park;Sooyeon Shin

  • Affiliations:
  • Dept. of Computer Engineering, Sejong University, Seoul, Korea;Dept. of Computer Engineering, Sejong University, Seoul, Korea;Dept. of Computer Engineering, Sejong University, Seoul, Korea

  • Venue:
  • UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In ubiquitous computing environments, the computer technology will recede into the background of our lives for its ultimate goal, invisibility. For ensuring security and privacy in those environments, both human beings and surrounding devices should be authenticated under the interaction methods that are used for ubiquitous services. However, the invisibility of devices, the adaptiveness of interactions, and the varying performance of devices will make it difficult to achieve it. In this paper, we reconsider authentication for ubiquitous computing environments and propose a conceptual framework for resolving the difficulties.