Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorLi, J.
dc.contributor.authorLoomes, M.
dc.date.accessioned2009-06-17T10:13:39Z
dc.date.available2009-06-17T10:13:39Z
dc.date.issued2006
dc.identifier.citationChristianson , B , Li , J & Loomes , M 2006 , ' “Fair” Authentication in Pervasive Computing ' , Lecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics , vol. 4074 , pp. 132-143 . https://doi.org/10.1007/11801412_13
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 98773
dc.identifier.otherPURE UUID: 9595e453-c2e2-495d-beee-d9d2f6a89f1c
dc.identifier.otherdspace: 2299/3598
dc.identifier.otherScopus: 33749019744
dc.identifier.urihttp://hdl.handle.net/2299/3598
dc.description"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA]
dc.description.abstractAuthentication is traditionally required to be strong enough to distinguish legitimate entities from unauthorised entities, and always involves some form of proof of identity, directly or indirectly. Conventional storable or delegable authentication scenarios in the pervasive computing environment are often frustrated by the qualitative changes of pervasive computing when humans are admitted into the loop. In this paper, we present an alternative approach based upon involving human self-determination in security protocols. This targets the authentication problem in pervasive computing, particularly when communication occurs in mobile ad-hoc fashion. We propose the argument of “thinkable” authentication, which involves using two-level protocols with the consideration of minimising trustworthiness in both human and computer device domains, but without unnecessary entity identity authentication. Thus, self-determining knowledge of the human interactions in pervasive computing can be exploited in order to make improvements on current security mechanisms.en
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
dc.subjectMobile ad-hoc Networks
dc.title“Fair” Authentication in Pervasive Computingen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecordhttps://doi.org/10.1007/11801412_13
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record