Security

Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices Using Secure Three Way Authentication

Download Now Free registration required

Executive Summary

In today's world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from the fellow user or from the service provider or maybe he wants to control his smart devices at home from wherever he is. In the present era of mobile environments, interactions between the user device and the service provider must be secure enough regardless of the type of device used to access or utilize the services.

  • Format: PDF
  • Size: 679.93 KB