[图书][B] Privacy preserving middleware platform for IoT
PRR Sousa - 2021 - search.proquest.com
The growing deployment of Internet of Things (IoT) technologies and the different ways
sensors are connected, acquire and use personal data highlight the need for transparency …
sensors are connected, acquire and use personal data highlight the need for transparency …
A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks
YA Malkani, MA Malik, LD Dhomeja… - Sukkur IBA Journal …, 2021 - journal.iba-suk.edu.pk
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks
(MANets) are becoming very common nowadays. MANets may consist of a number of small …
(MANets) are becoming very common nowadays. MANets may consist of a number of small …
Security for ubiquitous computing
T Straub, A Heinemann - Human Computer Interaction: Concepts …, 2009 - igi-global.com
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the
need for security. The reader will learn what makes security challenging and what the risks …
need for security. The reader will learn what makes security challenging and what the risks …
pTASC: trustable autonomous secure communications
The number of devices connected to the Internet has been increasing exponentially. There
is a substantial amount of data being exchanged among numerous connected devices. The …
is a substantial amount of data being exchanged among numerous connected devices. The …
A proof-of-proximity framework for device pairing in ubiquitous computing environments
YA Malkani - 2011 - sussex.figshare.com
Ad hoc interactions between devices over wireless networks in ubiquitous computing
environments present a security problem: the generation of shared secrets to initialize …
environments present a security problem: the generation of shared secrets to initialize …
[PDF][PDF] A Generic Framework for Device Pairing in Ubiquitous Computing Environments
Recently secure device pairing has had significant attention from a wide community of
academic as well as industrial researchers and a plethora of schemes and protocols have …
academic as well as industrial researchers and a plethora of schemes and protocols have …
[PDF][PDF] Cross Sectoral Cybersecurity Building Blocks
AIT Lead - cybersec4europe.eu
A main objective of CyberSec4Europe is to develop core innovative cybersecurity building
blocks, providing pioneering technologies on top of innovative tools to enhance the security …
blocks, providing pioneering technologies on top of innovative tools to enhance the security …
[PDF][PDF] Proximity-Based Authentication for Windows Domains
E Aitenbichler, A Heinemann - UbiComp 2007 Workshop …, 2007 - researchgate.net
Over the past few years, several authentication methods based on location-limited channels
have been presented in research literature. We extend this notion to location-aware, zero …
have been presented in research literature. We extend this notion to location-aware, zero …
[PDF][PDF] SECURE DEVICE PAIRING: A USABILITY STUDY
YA Malkani, A Keerio, LD Dhomeja - International Journal of …, 2012 - researchgate.net
Ubiquitous computing systems are becoming more common nowadays. Usually, these
systems are composed of several modern hand-held devices, which support wireless …
systems are composed of several modern hand-held devices, which support wireless …
Secure Device Association
YA Malkani, D Chalmers… - Security of Self-Organizing …, 2016 - api.taylorfrancis.com
More and more computing devices are coming into existence every day, which may vary in
size, capabilities, mode of interaction, and so on. As a result we are moving toward a world …
size, capabilities, mode of interaction, and so on. As a result we are moving toward a world …