Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Divyan M. Konidala"'
Autor:
Divyan M. Konidala, Daeyoung Kim, Made Harta Dwijaksara, Dongman Lee, Soontae Kim, Kwangjo Kim, Byoungcheon Lee
Publikováno v:
Personal and Ubiquitous Computing. 16:643-654
Credit/debit card payment transactions do not protect the privacy of the customer. Once the card is handed over to the merchant for payment processing, customers are "no longer in control" on how their card details and money are handled. This leads t
Publikováno v:
Journal of Information Processing Systems. 7:111-120
The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: auth
Publikováno v:
Information Security Practice and Experience ISBN: 9783642380327
ISPEC
ISPEC
In this paper we focus on authentication and privacy aspects of an application scenario that utilizes mobile crowd sensing for the benefit of amusement park operators and their visitors. The scenario involves a mobile app that gathers visitors’ dem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::de295ed1fc9ee5e5fc47c7673e931508
https://doi.org/10.1007/978-3-642-38033-4_13
https://doi.org/10.1007/978-3-642-38033-4_13
Autor:
Kwangjo Kim, Divyan M. Konidala
Publikováno v:
Information Security and Cryptology – ICISC 2006 ISBN: 9783540491125
ICISC
ICISC
With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view informati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::69cee89b03b7b70fbc9f9224609fb8e8
https://doi.org/10.1007/11927587_17
https://doi.org/10.1007/11927587_17
Publikováno v:
PerCom Workshops
In a pervasive computing environment, users interact with many smart devices or service providers (SPs) to obtain some useful services from them. These SPs can be either genuine or malicious. As a result, users privacy is at a greater risk, as they a
Publikováno v:
Progress in Cryptology-INDOCRYPT 2004 ISBN: 9783540241300
INDOCRYPT
INDOCRYPT
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However, there is an inherent disadvantage in such systems: the problem of pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38c6e742d9293f47de74229404058e50
https://doi.org/10.1007/978-3-540-30556-9_29
https://doi.org/10.1007/978-3-540-30556-9_29
Publikováno v:
International Journal of Internet Technology and Secured Transactions. 2:222
RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, we attempt to summarise current research in
Publikováno v:
Scopus-Elsevier
GLOBECOM
GLOBECOM
This paper focuses on one of the future applications and services area of mobile communications. Mobile devices like mobile phones and PDAs would very soon allow us to interact with other smart devices around us, thus supporting a ubiquitous society.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::26632a8dff14a8843332db9a85334c53
http://www.scopus.com/inward/record.url?eid=2-s2.0-18144366190&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-18144366190&partnerID=MN8TOARS