Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.
Cited By
- El Husseini A, M'hamed A, El Hassan B and Mokhtari M (2013). Trust-based authentication scheme with user rating for low-resource devices in smart environments, Personal and Ubiquitous Computing, 17:5, (1013-1023), Online publication date: 1-Jun-2013.
- Delgado-Mohatar O, Fúster-Sabater A and Sierra J (2011). A light-weight authentication scheme for wireless sensor networks, Ad Hoc Networks, 9:5, (727-735), Online publication date: 1-Jul-2011.
- Oladimeji E, Chung L, Jung H and Kim J Managing security and privacy in ubiquitous eHealth information interchange Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-10)
- Gong N, Laibowitz M and Paradiso J Dynamic privacy management in pervasive sensor networks Proceedings of the First international joint conference on Ambient intelligence, (96-106)
- Delgado-Mohatar O, Sierra J, Brankovic L and Fúster-Sabater A An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices, (332-339)
- Yu Z and Nakamura Y (2010). Smart meeting systems, ACM Computing Surveys, 42:2, (1-20), Online publication date: 1-Feb-2010.
- Giannotti F and Saygin Y Privacy and security in ubiquitous knowledge discovery Ubiquitous knowledge discovery, (75-89)
- Giannotti F and Saygin Y Privacy and security in ubiquitous knowledge discovery Ubiquitous knowledge discovery, (75-89)
- Cagalj M, Saxena N and Uzun E On the Usability of Secure Association of Wireless Devices Based on Distance Bounding Proceedings of the 8th International Conference on Cryptology and Network Security, (443-462)
- Shi X and Pazat J (2009). An adaptive and safe ubicomp for HPC applications, International Journal of Ad Hoc and Ubiquitous Computing, 4:6, (363-371), Online publication date: 1-Sep-2009.
- Stajano F (2009). Foot-driven computing, SIGSPATIAL Special, 1:2, (28-32), Online publication date: 1-Jul-2009.
- Oyomno W, Jäppinen P and Kerttula E Privacy implications of context-aware services Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE, (1-9)
- Babulak E Next generation of transportation & information technologies Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, (1-4)
- Meyer G, Främling K and Holmström J (2009). Intelligent Products, Computers in Industry, 60:3, (137-148), Online publication date: 1-Apr-2009.
- Ahamed S and Sharmin M (2008). A trust-based secure service discovery (TSSD) model for pervasive computing, Computer Communications, 31:18, (4281-4293), Online publication date: 1-Dec-2008.
- Saxena A, Lacoste M, Jarboui T, Lücking U and Steinke B A software framework for autonomic security in pervasive environments Proceedings of the 3rd international conference on Information systems security, (91-109)
- Oliveira P and Barros J Network coding protocols for secret key distribution Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1718-1733)
- Bichler D, Stromberg G, Huemer M and Löw M Key generation based on acceleration data of shaking processes Proceedings of the 9th international conference on Ubiquitous computing, (304-317)
- Spiekermann S Privacy enhancing technologies for RFID in retail- an empirical investigation Proceedings of the 9th international conference on Ubiquitous computing, (56-72)
- Park H, Lim S, Yie I, Kim H, Chun K and Lee J An information aggregation scheme of multi-node in ubiquitous sensor networks Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking, (60-68)
- Irshad A, Iqbal M, Ali A and Shafiq M An algorithm for prediction of overhead messages in client-server based wireless networks Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV, (412-423)
- Shi X and Pazat J A novel adaptive and safe framework for ubicomp Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining, (550-561)
- Großschädl J, Tillich S, Rechberger C, Hofmann M and Medwed M Energy evaluation of software implementations of block ciphers under memory constraints Proceedings of the conference on Design, automation and test in Europe, (1110-1115)
- Park J, Song J, Koh B, Lee D and Park B A hybrid intelligent multimedia service framework in next generation home network environment Proceedings of the 1st international conference on Advances in hybrid information technology, (395-403)
- Rosa-Velardo F and de Frutos-Escrig D Symbolic semantics for the verification of security properties of mobile petri nets Proceedings of the 4th international conference on Automated Technology for Verification and Analysis, (461-476)
- Nosseir A, Connor R, Revie C and Terzis S Question-based authentication using context data Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles, (429-432)
- Čapkun S and Čagalj M Integrity regions Proceedings of the 5th ACM workshop on Wireless security, (1-10)
- Schlott S, Kargl F and Weber M Re-identifying anonymous nodes Proceedings of the Second international conference on Location- and Context-Awareness, (103-115)
- Zhou B, Shi Q and Merabti M Real-time intrusion detection in ubiquitous networks with a string-based approach Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV, (352-359)
- Accorsi R and Hohl A Delegating secure logging in pervasive computing systems Proceedings of the Third international conference on Security in Pervasive Computing, (58-72)
- Blaß E and Zitterbart M An efficient key establishment scheme for secure aggregating sensor networks Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (303-310)
- Park J, Choi J, Lee S, Park H and Lee D User-oriented multimedia service using smart sensor agent module in the intelligent home Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I, (313-320)
- Dragovic B and Policroniades C Information seesaw Proceedings of the Second VDLB international conference on Secure Data Management, (200-216)
- Stajano F (2005). RFID is x-ray vision, Communications of the ACM, 48:9, (31-33), Online publication date: 1-Sep-2005.
- Ko H, Sohn B, Park H and Shin Y Safe authentication method for security communication in ubiquitous Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (442-448)
- Wong F and Stajano F Multi-channel protocols Proceedings of the 13th international conference on Security protocols, (112-127)
- Jacobsson M and Niemegeers I Privacy and Anonymity in Personal Networks Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, (130-135)
- Floerkemeier C, Schneider R and Langheinrich M Scanning with a purpose Proceedings of the Second international conference on Ubiquitous Computing Systems, (214-231)
- Dragovic B and Crowcroft J Information exposure control through data manipulation for ubiquitous computing Proceedings of the 2004 workshop on New security paradigms, (57-64)
- Hof H, Blaß E and Zitterbart M Secure overlay for service centric wireless sensor networks Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (125-138)
- Stajano F One user, many hats; and, sometimes, no hat Proceedings of the 12th international conference on Security Protocols, (51-64)
- Čapkun S, Buttyán L and Hubaux J SECTOR Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (21-32)
- Čapkun S and Hubaux J BISS Proceedings of the 2nd ACM workshop on Wireless security, (21-29)
- Čapkun S, Hubaux J and Buttyán L Mobility helps security in ad hoc networks Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (46-56)
- Gray E, Seigneur J, Chen Y and Jensen C Trust propagation in small worlds Proceedings of the 1st international conference on Trust management, (239-254)
- Corner M and Noble B Protecting applications with transient authentication Proceedings of the 1st international conference on Mobile systems, applications and services, (57-70)
- Ayatsuka Y, Kohno M and Rekimoto J ShownPass CHI '03 Extended Abstracts on Human Factors in Computing Systems, (984-985)
- Al-Muhtadi J, Ranganathan A, Campbell R and Mickunas M Cerberus Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
- Stajano F and Crowcroft J The butt of the iceberg Ambient intelligence, (91-101)
- Beresford A and Stajano F (2003). Location Privacy in Pervasive Computing, IEEE Pervasive Computing, 2:1, (46-55), Online publication date: 1-Jan-2003.
- Stajano F Security for whom? the shifting security assumptions of pervasive computing Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems, (16-27)
- Campbell R, Al-Muhtadi J, Naldurg P, Sampemane G and Mickunas M Towards security and privacy for pervasive computing Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems, (1-15)
Index Terms
- Security: for ubiquitous computing
Recommendations
Ubiquitous security for ubiquitous computing
AbstractThe potential for rapid and diverse interconnectivity through devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However, this has resulted in equally ubiquitous security ...
Security Issues in Design and Development of High Performance Ubiquitous Computing
CICN '14: Proceedings of the 2014 International Conference on Computational Intelligence and Communication NetworksWith the advancement of internet and smart devices from decades, Societies appear ready to adopt new technologies as fast as they emerge. In today world, advances are making thoughts into reality. Every day we read about new advancements, one emerging ...