2018
DOI: 10.1186/s13174-018-0095-2
|View full text |Cite
|
Sign up to set email alerts
|

The computer for the 21st century: present security & privacy challenges

Abstract: Decades went by since Mark Weiser published his influential work on the computer of the 21st century. Over the years, some of the UbiComp features presented in that paper have been gradually adopted by industry players in the technology market. While this technological evolution resulted in many benefits to our society, it has also posed, along the way, countless challenges that we have yet to surpass. In this paper, we address major challenges from areas that most afflict the UbiComp revolution: 1. Software P… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 158 publications
(182 reference statements)
0
4
0
Order By: Relevance
“…We also analyze the advance of Ubicomp regarding what is a reality now and what is still very difficult to implement. To do that, we read and discuss some newest papers such as Caceres and Friday (2012);Oliveira et al (2018). Context-awareness and system adaptation.…”
Section: Teaching Ubiquitous Computing: Experience Reported In Our Unmentioning
confidence: 99%
See 1 more Smart Citation
“…We also analyze the advance of Ubicomp regarding what is a reality now and what is still very difficult to implement. To do that, we read and discuss some newest papers such as Caceres and Friday (2012);Oliveira et al (2018). Context-awareness and system adaptation.…”
Section: Teaching Ubiquitous Computing: Experience Reported In Our Unmentioning
confidence: 99%
“…IBM created the term Pervasive Computing in 1998 and claimed a world fulfilled with computing services accessible anywhere and anytime. At its beginning, Pervasive Computing was more related to smart spaces and mobile computing scenarios(Nieuwdorp, 2007). Nowadays, it is more challenging to identify a clear border separating these two concepts.…”
mentioning
confidence: 99%
“…Secure Internet-based communications rely on public-key cryptography, which allows entities to communicate without the need for sharing confidential material in advance. Elliptic curve cryptography (ECC), proposed in 1985, is still a predominant type of publickey cryptography [1]. ECC is commonly used for encrypted emails, online banking, secure e-commerce websites, digital signatures, and other data transfer applications where the size of the storage space for public keys is an issue.…”
Section: Introductionmentioning
confidence: 99%
“…The ubiquitous nature of the IoT, however, brings forth a series of security concerns 4 . In this scenario, computing elements are ubiquitous and track every aspect of users' daily routines.…”
Section: Introductionmentioning
confidence: 99%