AGE: authentication in gadget-free healthcare environments
نویسندگان
چکیده
منابع مشابه
Panel: Authentication in Constrained Environments
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-written notes. Mike Burmester (M. B.): We are having a talk here, on the topic of authentication on constrained environments. The panelists could take it into any direction they find interesting. I chose this topic because it is alm...
متن کاملPersistent Authentication in Smart Environments
Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based information, e.g., it is common to have swipe card terminals placed next to doors to restricted ar...
متن کاملDistortion-Free Authentication Watermarking
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.
متن کاملRandomized and Efficient Authentication in Mobile Environments
In a mobile environment, a number of users act as a network nodes and communicate with one another to acquire location based information and services. This emerging paradigm has opened up new business opportunities and enables numerous applications such as road safety enhancement, service recommendations and mobile entertainment. A fundamental issue that impacts the success of these application...
متن کاملDevice Authentication In Wireless And Pervasive Environments
Security can only be guaranteed as long as the hardware and other key parameters, including software components, secret keys etc, of a device remain genuine and unmodified. Under this context, device authentication must be considered as a key security issue, complementary and of equal importance to user authentication, in today’s wireless and forthcoming ubiquitous realms. This paper classifies...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology and Management
سال: 2019
ISSN: 1385-951X,1573-7667
DOI: 10.1007/s10799-019-00306-z