Some computer science issues in ubiquitous computing
ACM SIGMOBILE Mobile Computing and Communications Review - Special issue dedicated to Mark Weiser
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Hi-index | 0.00 |
In ubiquitous computing environments, the computer technology will recede into the background of our lives for its ultimate goal, invisibility. For ensuring security and privacy in those environments, both human beings and surrounding devices should be authenticated under the interaction methods that are used for ubiquitous services. However, the invisibility of devices, the adaptiveness of interactions, and the varying performance of devices will make it difficult to achieve it. In this paper, we reconsider authentication for ubiquitous computing environments and propose a conceptual framework for resolving the difficulties.