Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
The official PGP user's guide
Computer
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Proceedings of the International Workshop on Security Protocols
The Resurrecting Duckling - What Next?
Revised Papers from the 8th International Workshop on Security Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Hierarchical Trustworthy Authentication for Pervasive Computing
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In a pervasive computing environment, principle authentication verifies if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approach for implementing trustworthy authentication and related work are also presented.