2003
DOI: 10.1007/3-540-36532-x_3
|View full text |Cite
|
Sign up to set email alerts
|

Active Authentication for Pervasive Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Furthermore, Matsumiya K. et al [15] wrote in their paper: "Computing environment surrounding people are becoming pervasive and ubiquitous populated with mobile devices and various appliances. With the use of these devices, users can access computational resources with increased mobility.…”
Section: Authentication and Authorizationmentioning
confidence: 99%
“…Furthermore, Matsumiya K. et al [15] wrote in their paper: "Computing environment surrounding people are becoming pervasive and ubiquitous populated with mobile devices and various appliances. With the use of these devices, users can access computational resources with increased mobility.…”
Section: Authentication and Authorizationmentioning
confidence: 99%
“…the hypermedia mobile system (Yue et al, 2005), the silent partner concept (Crowley, 2006) and the dynamic user-viewpoint tracking system (Khoury & Kamat, 2009)) as well as in smart home applications, the aim is indeed of anticipating and not influencing users' needs and actions. (Matsumiya et al, 2003) specifically address the problem of unobtrusiveness and "zero disturbance" in pervasive computing. The authors present an authentication model, which aims at authenticating mobile users without interfering with their mobile behaviour.…”
Section: Machine Error Handlingmentioning
confidence: 99%
“…We have developed an active authentication system for library using Active Authentication System [9], and installed it into the Smart Furniture as showin in Figure 8. Each user has a client device with wireless LAN and books with RFID tags.…”
Section: An Active Authentication System For Librarymentioning
confidence: 99%