Title
Trustworthiness and authentication in ubiquitous computing
Abstract
In a pervasive computing environment, principle authentication verifies if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approach for implementing trustworthy authentication and related work are also presented.
Year
DOI
Venue
2012
10.1145/2386995.2387018
MOBIWAC
Keywords
Field
DocType
paper discusses trust,related work,pervasive computing environment,principle authentication verifies,trustworthy authentication,ubiquitous computing,pervasive computing,expected entity,authentication,trustworthiness,trust
Challenge-Handshake Authentication Protocol,Authentication,Computer science,Computer security,Trustworthiness,Computer network,Authentication protocol,Ubiquitous computing,Multi-factor authentication
Conference
ISSN
Citations 
PageRank 
1947-8151
0
0.34
References 
Authors
10
4
Name
Order
Citations
PageRank
Hannan Xiao18310.58
James A. Malcolm220256.28
Bruce Christianson34410.59
Ying Zhang441928.64