Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
k-anonymous secret handshakes with reusable credentials
Proceedings of the 11th ACM conference on Computer and communications security
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
The quest for personal control over mobile location privacy
IEEE Communications Magazine
Journal of Network and Computer Applications
Hi-index | 0.02 |
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to reveal their identities while using some privacy-related services such as location information, printing, browsing web pages, etc. In addition, we should consider lightweight cryptographic protocols because UCE can be constructed by lots of resource and energy constrained devices. In this paper we propose a lightweight privacy-preserving authentication and access control scheme for UCE. Compared to the previous schemes [13,14], our proposed scheme which was designed to reduce the number of public key operations and to improve non-linkability feature is found to be more secure and requires less memory on the user's device. Moreover the proposed scheme provides mutual authentication, accountability and differentiated access control.