Title | ||
---|---|---|
The master key: a private authentication approach for pervasive computing environments |
Abstract | ||
---|---|---|
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the master key, which aggregates all his digital forms of access tokens for entity authentication. The master key discovers and selects proper tokens for its owner. With an emphasis on usability, the master key secures authentication, protects privacy information from outsiders and insiders, and supports various claimant-verifier relations. We analyze privacy and security properties of our approach and protocols, and we investigate the overhead. Performance measurements show that our protocols are efficient |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/PERCOM.2006.47 | PerCom |
Keywords | Field | DocType |
protocols,proper token,data privacy,claimant-verifier relations,private authentication approach,private key cryptography,privacy information protection,pervasive computing environments,digital form,pervasive computing environment,ubiquitous computing,security properties,master key secures authentication,master key,performance measurement,entity authentication,access token,message authentication,novel entity authentication approach,privacy information,smart cards,computer science,authentication,privacy,application software,usability,pervasive computing,data security | Data security,Authentication,Master key,Message authentication code,Computer security,Computer science,Usability,Computer network,Ubiquitous computing,Information privacy,Multi-factor authentication | Conference |
ISBN | Citations | PageRank |
0-7695-2518-0 | 11 | 0.70 |
References | Authors | |
13 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Feng Zhu | 1 | 162 | 11.68 |
Matt Mutka | 2 | 2514 | 361.75 |
Lionel M. Ni | 3 | 9462 | 802.67 |