Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/7749
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKulkarni, U.P.
dc.contributor.authorVadavi, J.V.
dc.contributor.authorJoshi, S.M.
dc.contributor.authorSekaran, K.C.
dc.contributor.authorYardi, A.R.
dc.date.accessioned2020-03-30T10:02:44Z-
dc.date.available2020-03-30T10:02:44Z-
dc.date.issued2006
dc.identifier.citationISAHUC' 06 - Proceedings of 2006 International Symposium on Ad Hoc and Ubiquitous Computing, 2006, Vol., , pp.52-55en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7749-
dc.description.abstractUbiquitous computing technology provides an environment where users expect to access resources and services anytime and anywhere. The serious security risks and problems arise because resources can now be accessed by almost anyone with a mobile device in such an open model. This paper explores security in ubiquitous computing with focus on authentication. We propose a new model, which uses distributed hierarchical tree based approach for authenticating ubiquitous objects which overcomes the problems associated with centralized source of information. � 2006 IEEE.en_US
dc.titleDistributed multi level security token based authentication for ubiquitous objects -DMSAen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.