Safe authentication method for security communication in ubiquitous

12Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Ko, H., Sohn, B., Park, H., & Shin, Y. (2005). Safe authentication method for security communication in ubiquitous. In Lecture Notes in Computer Science (Vol. 3481, pp. 442–448). Springer Verlag. https://doi.org/10.1007/11424826_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free