Abstract | ||
---|---|---|
In a pervasive computing environment, principle authentication verifies if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approach for implementing trustworthy authentication and related work are also presented. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1145/2386995.2387018 | MOBIWAC |
Keywords | Field | DocType |
paper discusses trust,related work,pervasive computing environment,principle authentication verifies,trustworthy authentication,ubiquitous computing,pervasive computing,expected entity,authentication,trustworthiness,trust | Challenge-Handshake Authentication Protocol,Authentication,Computer science,Computer security,Trustworthiness,Computer network,Authentication protocol,Ubiquitous computing,Multi-factor authentication | Conference |
ISSN | Citations | PageRank |
1947-8151 | 0 | 0.34 |
References | Authors | |
10 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hannan Xiao | 1 | 83 | 10.58 |
James A. Malcolm | 2 | 202 | 56.28 |
Bruce Christianson | 3 | 44 | 10.59 |
Ying Zhang | 4 | 419 | 28.64 |