In mobile computing applications the traditional name-based concept of identity is both difficult to support and frequently inappropriate. The natural alternative is to use the context in which parties sit to identify them. We discuss this issue and the ways in which Human Interactive Security Protocols (HISPs) can play a role in enabling this. © 2011 Springer-Verlag.
CITATION STYLE
Chen, B., Nguyen, L. H., & Roscoe, A. W. (2011). When context is better than identity: Authentication by context using empirical channels. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7114 LNCS, pp. 115–125). https://doi.org/10.1007/978-3-642-25867-1_10
Mendeley helps you to discover research relevant for your work.