The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Handling uncertainty in multimodal pervasive computing applications
Computer Communications
Hi-index | 0.00 |
We propose a Zero-stop Authentication model, which models the process of actively authenticating users in an environment populated with various mobile and embedded devices. In such an environment, since users are mobile, an authentication mechanism that does not disturb the user movement, and that decreases the user burden is needed. The model determines the timing constraint needed to realize "zero-stop" property from the speed of the users, size of the sensing area, and the overhead of sensing and authentication process. We also present a Zero-stop Authentication system to realize the model, and demonstrate the prototype implementation.