An efficient device authentication protocol using bioinformatic

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The personalization of computing environments is one of the key aspects of ubiquitous computing, and such personalization requires isolated computing environments for better security and stability. In this paper, we propose a mutual authentication method using biometric information of each device users in a situation where device A communicates with device B which is in heterogenous environment. Proposed scheme is designed to be agile in a peer-to-peer environment. We provide analysis results against security attacks and number of required procedures for device authentication. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Jeong, Y. S., Lee, B. K., & Lee, S. H. (2007). An efficient device authentication protocol using bioinformatic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4456 LNAI, pp. 567–575). Springer Verlag. https://doi.org/10.1007/978-3-540-74377-4_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free