[go: up one dir, main page]

Xiong et al., 2003 - Google Patents

Secure Invisible Computing

Xiong et al., 2003

View PDF
Document ID
14107939570042378753
Author
Xiong Y
Helander J
Forin A
Yuval G
Publication year
Publication venue
MicroSoft Techmical Report

External Links

Snippet

Invisible computing creates better everyday devices by augmenting them with computation and communication. The native interface of a particular device suffices, with computation and communication occurring transparently to the user. An invisible computing device does …
Continue reading at www.microsoft.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements

Similar Documents

Publication Publication Date Title
Jia et al. A blockchain-assisted privacy-aware authentication scheme for Internet of Medical Things
Perrig et al. SPINS: Security protocols for sensor networks
Maughan et al. Internet security association and key management protocol (ISAKMP)
Sahraoui et al. Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
Mahalle et al. Identity establishment and capability based access control (iecac) scheme for internet of things
Babu et al. A distributed identity‐based authentication scheme for internet of things devices using permissioned blockchain system
US10158636B2 (en) Method for setting up a secure end-to-end communication between a user terminal and a connected object
Yu et al. Enabling end-to-end secure communication between wireless sensor networks and the Internet
Kumar et al. A lightweight signcryption method for perception layer in Internet-of-Things
Park et al. A group-oriented DTLS handshake for secure IoT applications
Shukla et al. A bit commitment signcryption protocol for wireless transport layer security (wtls)
Maughan et al. Rfc2408: Internet security association and key management protocol (isakmp)
Malik et al. L-ecqv: Lightweight ecqv implicit certificates for authentication in the internet of things
Boyd A class of flexible and efficient key management protocols
Chien et al. A hybrid authentication protocol for large mobile network
Elgohary et al. Design of an enhancement for SSL/TLS protocols
Helander et al. Secure web services for low-cost devices
KR100456624B1 (en) Authentication and key agreement scheme for mobile network
Babu et al. Trust-based permissioned blockchain network for identification and authentication of internet of smart devices: An e-commerce prospective
Xiong et al. Secure Invisible Computing
Thungon et al. A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things
Mayrhofer et al. Securing passive objects in mobile ad-hoc peer-to-peer networks
Suherman et al. Embedding the three pass protocol messages into transmission control protocol header
Wang et al. IoT data security authentication and key negotiation scheme based on edge computing and blockchain
Godfrey A Comparison of Security Protocols in a Wireless Network Environment