[图书][B] Privacy preserving middleware platform for IoT

PRR Sousa - 2021 - search.proquest.com
The growing deployment of Internet of Things (IoT) technologies and the different ways
sensors are connected, acquire and use personal data highlight the need for transparency …

A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks

YA Malkani, MA Malik, LD Dhomeja… - Sukkur IBA Journal …, 2021 - journal.iba-suk.edu.pk
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks
(MANets) are becoming very common nowadays. MANets may consist of a number of small …

Security for ubiquitous computing

T Straub, A Heinemann - Human Computer Interaction: Concepts …, 2009 - igi-global.com
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the
need for security. The reader will learn what makes security challenging and what the risks …

pTASC: trustable autonomous secure communications

PR Sousa, A Cirne, JS Resende, R Martins… - Proceedings of the 20th …, 2019 - dl.acm.org
The number of devices connected to the Internet has been increasing exponentially. There
is a substantial amount of data being exchanged among numerous connected devices. The …

A proof-of-proximity framework for device pairing in ubiquitous computing environments

YA Malkani - 2011 - sussex.figshare.com
Ad hoc interactions between devices over wireless networks in ubiquitous computing
environments present a security problem: the generation of shared secrets to initialize …

[PDF][PDF] A Generic Framework for Device Pairing in Ubiquitous Computing Environments

YA Malkani, D Chalmers, I Wakeman… - International Journal of …, 2012 - researchgate.net
Recently secure device pairing has had significant attention from a wide community of
academic as well as industrial researchers and a plethora of schemes and protocols have …

[PDF][PDF] Cross Sectoral Cybersecurity Building Blocks

AIT Lead - cybersec4europe.eu
A main objective of CyberSec4Europe is to develop core innovative cybersecurity building
blocks, providing pioneering technologies on top of innovative tools to enhance the security …

[PDF][PDF] Proximity-Based Authentication for Windows Domains

E Aitenbichler, A Heinemann - UbiComp 2007 Workshop …, 2007 - researchgate.net
Over the past few years, several authentication methods based on location-limited channels
have been presented in research literature. We extend this notion to location-aware, zero …

[PDF][PDF] SECURE DEVICE PAIRING: A USABILITY STUDY

YA Malkani, A Keerio, LD Dhomeja - International Journal of …, 2012 - researchgate.net
Ubiquitous computing systems are becoming more common nowadays. Usually, these
systems are composed of several modern hand-held devices, which support wireless …

Secure Device Association

YA Malkani, D Chalmers… - Security of Self-Organizing …, 2016 - api.taylorfrancis.com
More and more computing devices are coming into existence every day, which may vary in
size, capabilities, mode of interaction, and so on. As a result we are moving toward a world …