dc.contributor.author | Christianson, B. | |
dc.contributor.author | Li, J. | |
dc.contributor.author | Loomes, M. | |
dc.date.accessioned | 2009-06-17T10:13:39Z | |
dc.date.available | 2009-06-17T10:13:39Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Christianson , B , Li , J & Loomes , M 2006 , ' “Fair” Authentication in Pervasive Computing ' , Lecture Notes in Computer Science (LNCS) , vol. 4074 , pp. 132-143 . https://doi.org/10.1007/11801412_13 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | dspace: 2299/3598 | |
dc.identifier.uri | http://hdl.handle.net/2299/3598 | |
dc.description | "The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA] | |
dc.description.abstract | Authentication is traditionally required to be strong enough to distinguish legitimate entities from unauthorised entities, and always involves some form of proof of identity, directly or indirectly. Conventional storable or delegable authentication scenarios in the pervasive computing environment are often frustrated by the qualitative changes of pervasive computing when humans are admitted into the loop. In this paper, we present an alternative approach based upon involving human self-determination in security protocols. This targets the authentication problem in pervasive computing, particularly when communication occurs in mobile ad-hoc fashion. We propose the argument of “thinkable” authentication, which involves using two-level protocols with the consideration of minimising trustworthiness in both human and computer device domains, but without unnecessary entity identity authentication. Thus, self-determining knowledge of the human interactions in pervasive computing can be exploited in order to make improvements on current security mechanisms. | en |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.subject | Mobile ad-hoc Networks | |
dc.title | “Fair” Authentication in Pervasive Computing | en |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/11801412_13 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |