Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Security: for ubiquitous computing
Security: for ubiquitous computing
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Active networks privacy protection and vulnerabilities
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Dissolving active networks privacy threats and vulnerabilities
WSEAS TRANSACTIONS on COMMUNICATIONS
A study on dynamic state information (DSI) around users for safe urban life
Computers & Mathematics with Applications
Hi-index | 0.00 |
Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user’s position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.