2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications 2010
DOI: 10.1109/icut.2010.5677675
|View full text |Cite
|
Sign up to set email alerts
|

Main and Sub-Device Authentication Protocol in Ubiquitous Office Network

Abstract: In modern society, as the rapid development of IT technology combined with computer-based high-speed communication networks is enabling provision of a wide spectrum of services and devices, we have been confronted with a new era of cultural transformation, referred to as the information society. However, the security requirements that need to be considered have become more complicated and diversified, and the same security weaknesses exist as in the existing media or protocols. Particularly, an office network … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…By identifying and analyzing a number of security threats in terms of specific problem statements, which describes the security issues in various areas of smartphone use with respect to user authentication, we suggest effective security controls and techniques to resolve the existing security problems. For this, we also conduct a simulation of our security framework to prove its effectiveness in resolving the security problems related to smartphone and smart work environment [7].…”
Section: Introductionmentioning
confidence: 99%
“…By identifying and analyzing a number of security threats in terms of specific problem statements, which describes the security issues in various areas of smartphone use with respect to user authentication, we suggest effective security controls and techniques to resolve the existing security problems. For this, we also conduct a simulation of our security framework to prove its effectiveness in resolving the security problems related to smartphone and smart work environment [7].…”
Section: Introductionmentioning
confidence: 99%