Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Challenge: recombinant computing and the speakeasy approach
Proceedings of the 8th annual international conference on Mobile computing and networking
User interfaces when and where they are needed: an infrastructure for recombinant computing
Proceedings of the 15th annual ACM symposium on User interface software and technology
New Generation of IP-Phone Enabled Mobile Devices
Mobile HCI '02 Proceedings of the 4th International Symposium on Mobile Human-Computer Interaction
A Calculus for Access Control in Distributed Systems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
The Personal Server: Changing the Way We Think about Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A General and Flexible Access-Control System for the Web
Proceedings of the 11th USENIX Security Symposium
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Designing for serendipity: supporting end-user configuration of ubiquitous computing environments
DIS '02 Proceedings of the 4th conference on Designing interactive systems: processes, practices, methods, and techniques
A Logic for SDSI's Linked Local Name Spaces: Preliminary Version
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Binder, a Logic-Based Security Language
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
A Security Infrastructure for Distributed Java Applications
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Securing a Remote Terminal Application with a Mobile Trusted Device
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Distributed Proving in Access-Control Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Face-to-Face Media Sharing Using Wireless Mobile Devices
ISM '05 Proceedings of the Seventh IEEE International Symposium on Multimedia
Network-in-a-box: how to set up a secure wireless network in under a minute
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
ACM Transactions on Computer-Human Interaction (TOCHI)
Proximity-based authentication of mobile devices
International Journal of Security and Networks
MMSys '10 Proceedings of the first annual ACM SIGMM conference on Multimedia systems
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
OntoIAS: An ontology-supported information agent shell for ubiquitous services
Expert Systems with Applications: An International Journal
An ontology-supported ubiquitous interface agent for cloud computing: example on Zigbee technique
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part III
Hi-index | 0.00 |
Effective ubiquitous computing applications need to integrate users' personal devices and data with the devices and resources they encounter around them. Previous work addressed this problem by simply enabling the user to take all of their data with them wherever they go. In this paper, we present a more flexible approach: the “instant matchmaker”, a personal device that allows a user to seamlessly and securely connect his local computing environment with his other personal resources, wherever they are. The matchmaker provides an intuitive user experience, while simultaneously enabling extremely fine-grained control over access to resources. We have implemented a cellphone-based matchmaker and explored its use in a secure media sharing application. The matchmaker concept, however, is general, and can be used to enable a range of appealing and secure ubicomp applications.