2010 Sixth International Conference on Wireless Communication and Sensor Networks 2010
DOI: 10.1109/wcsn.2010.5712289
|View full text |Cite
|
Sign up to set email alerts
|

A framework for continuous authentication in ubiquitous environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0
3

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 12 publications
0
2
0
3
Order By: Relevance
“…After 2007, many applications and new system designs are proposed one after another. Chowdhury et al present a framework to extend continuous authentication into the ubiquitous environment, where user-to-device authentication is one-to-many during a session [7]. Flior et al utilize continuous authentication to verify the identity in online examinations [9].…”
Section: Related Workmentioning
confidence: 99%
“…After 2007, many applications and new system designs are proposed one after another. Chowdhury et al present a framework to extend continuous authentication into the ubiquitous environment, where user-to-device authentication is one-to-many during a session [7]. Flior et al utilize continuous authentication to verify the identity in online examinations [9].…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge, there is no existing work on providing support of continuous user authentication at language level. For example, Chowdhury et al [13] and Kiyani et al [25] focus on the frameworks and the properties for CUA but less on providing the appropriate language abstractions to enable developers incorporate continuous use authentication in their software applications, leaving end-users vulnerable to unauthorised access and attacks.…”
Section: Introductionmentioning
confidence: 99%
“…νοσοκόµα). Επίσης, µπορεί να είναι µία συσκευή, όπως ένα έξυπνο τηλέφωνο, ένας προσωπικός υπολογιστής, ένας εξυπηρετητής, ένας αισθητήρας ή µία έξυπνη κάρτα [26], [35], [36]. • Η πιστοποίηση αυθεντικότητας προέλευσης δεδοµένων (data origin authentication): Σε µία µετάδοση χωρίς σύνδεση, επιβεβαιώνει ότι κάθε παραλαµβανόµενη µονάδα δεδοµένων προέρχεται από την πηγή από την οποία ισχυρίζεται ότι προέρχεται [30], [31].…”
Section: πιστοποίηση αυθεντικότηταςunclassified
“…ασθενής) της πληροφορίας (π.χ. βιοϊατρικά δεδοµένα) που λαµβάνει ο ιατρός [26], [35]. [20], [37], [38], [39], [40].…”
Section: πιστοποίηση αυθεντικότηταςunclassified
See 1 more Smart Citation