Safe authentication method for security communication in ubiquitous
- Authors
- Ko, H.; Sohn, Bong Soo; Park, H.; Shin, Y.
- Issue Date
- May-2005
- Publisher
- SPRINGER-VERLAG BERLIN
- Citation
- COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, v.3481, pp 442 - 448
- Pages
- 7
- Journal Title
- COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2
- Volume
- 3481
- Start Page
- 442
- End Page
- 448
- URI
- https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/60812
- ISSN
- 0302-9743
1611-3349
- Abstract
- Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.
- Files in This Item
-
- Appears in
Collections - College of Software > School of Computer Science and Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.