Xiong et al., 2003 - Google Patents
Secure Invisible ComputingXiong et al., 2003
View PDF- Document ID
- 14107939570042378753
- Author
- Xiong Y
- Helander J
- Forin A
- Yuval G
- Publication year
- Publication venue
- MicroSoft Techmical Report
External Links
Snippet
Invisible computing creates better everyday devices by augmenting them with computation and communication. The native interface of a particular device suffices, with computation and communication occurring transparently to the user. An invisible computing device does …
- 238000004891 communication 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jia et al. | A blockchain-assisted privacy-aware authentication scheme for Internet of Medical Things | |
Perrig et al. | SPINS: Security protocols for sensor networks | |
Maughan et al. | Internet security association and key management protocol (ISAKMP) | |
Sahraoui et al. | Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things | |
Mahalle et al. | Identity establishment and capability based access control (iecac) scheme for internet of things | |
Babu et al. | A distributed identity‐based authentication scheme for internet of things devices using permissioned blockchain system | |
US10158636B2 (en) | Method for setting up a secure end-to-end communication between a user terminal and a connected object | |
Yu et al. | Enabling end-to-end secure communication between wireless sensor networks and the Internet | |
Kumar et al. | A lightweight signcryption method for perception layer in Internet-of-Things | |
Park et al. | A group-oriented DTLS handshake for secure IoT applications | |
Shukla et al. | A bit commitment signcryption protocol for wireless transport layer security (wtls) | |
Maughan et al. | Rfc2408: Internet security association and key management protocol (isakmp) | |
Malik et al. | L-ecqv: Lightweight ecqv implicit certificates for authentication in the internet of things | |
Boyd | A class of flexible and efficient key management protocols | |
Chien et al. | A hybrid authentication protocol for large mobile network | |
Elgohary et al. | Design of an enhancement for SSL/TLS protocols | |
Helander et al. | Secure web services for low-cost devices | |
KR100456624B1 (en) | Authentication and key agreement scheme for mobile network | |
Babu et al. | Trust-based permissioned blockchain network for identification and authentication of internet of smart devices: An e-commerce prospective | |
Xiong et al. | Secure Invisible Computing | |
Thungon et al. | A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things | |
Mayrhofer et al. | Securing passive objects in mobile ad-hoc peer-to-peer networks | |
Suherman et al. | Embedding the three pass protocol messages into transmission control protocol header | |
Wang et al. | IoT data security authentication and key negotiation scheme based on edge computing and blockchain | |
Godfrey | A Comparison of Security Protocols in a Wireless Network Environment |