Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/7749
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kulkarni, U.P. | |
dc.contributor.author | Vadavi, J.V. | |
dc.contributor.author | Joshi, S.M. | |
dc.contributor.author | Sekaran, K.C. | |
dc.contributor.author | Yardi, A.R. | |
dc.date.accessioned | 2020-03-30T10:02:44Z | - |
dc.date.available | 2020-03-30T10:02:44Z | - |
dc.date.issued | 2006 | |
dc.identifier.citation | ISAHUC' 06 - Proceedings of 2006 International Symposium on Ad Hoc and Ubiquitous Computing, 2006, Vol., , pp.52-55 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7749 | - |
dc.description.abstract | Ubiquitous computing technology provides an environment where users expect to access resources and services anytime and anywhere. The serious security risks and problems arise because resources can now be accessed by almost anyone with a mobile device in such an open model. This paper explores security in ubiquitous computing with focus on authentication. We propose a new model, which uses distributed hierarchical tree based approach for authenticating ubiquitous objects which overcomes the problems associated with centralized source of information. � 2006 IEEE. | en_US |
dc.title | Distributed multi level security token based authentication for ubiquitous objects -DMSA | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.