Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Ko, H., Sohn, B., Park, H., & Shin, Y. (2005). Safe authentication method for security communication in ubiquitous. In Lecture Notes in Computer Science (Vol. 3481, pp. 442–448). Springer Verlag. https://doi.org/10.1007/11424826_46
Mendeley helps you to discover research relevant for your work.