Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Safe authentication method for security communication in ubiquitous

Authors
Ko, H.Sohn, Bong SooPark, H.Shin, Y.
Issue Date
May-2005
Publisher
SPRINGER-VERLAG BERLIN
Citation
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, v.3481, pp 442 - 448
Pages
7
Journal Title
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2
Volume
3481
Start Page
442
End Page
448
URI
https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/60812
ISSN
0302-9743
1611-3349
Abstract
Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.
Files in This Item
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Sohn, Bong Soo photo

Sohn, Bong Soo
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE