Security

Asserting User Identity in Pervasive Computing Environments Using a Non-Intrusive Technique

Download Now Free registration required

Executive Summary

Pervasive computing environments are exciting new vision of the new computing era due to the recent wide advances in wireless communication and digital electronics. These environments are small smart worlds that have many advantages such as the continuous and distributed interaction with people using a variety of wireless devices (such as mobile phones and PDAs), which are ubiquitous but provide useful services. In Pervasive Environments, it is important to establish the identity of a user interacting with that environment, in order to provide the user with the required services by the environment.

  • Format: PDF
  • Size: 338.89 KB