Comments on the S/KEY user authentication scheme
ACM SIGOPS Operating Systems Review
Shared authentication token secure against replay and weak key attacks
Information Processing Letters
Timestamps in key distribution protocols
Communications of the ACM
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Efficient and user friendly inter-domain device authentication/access control for home networks
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Authentication for single/multi domain in ubiquitous computing using attribute certification
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Device Authentication/Authorization Protocol for Home Network in Next Generation Security
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Hi-index | 0.00 |
The intelligent home network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As home network service is popularized, the interest in home network security is going up. Many people interested in home network security usually consider user authentication and authorization. But the consideration about home device authentication almost doesn't exist. In this paper, we describes home device authentication which is the basic and essential element in the home network security. We proposed S/Key based authentication, scheme for secure remote access in smart home networks. And our device authentication concept can offer home network service users convenience and security.