Ubiquitous ID Architecture

ثبت نشده
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Virtual Architecture based on the ID/Locator Split Concept for Future Wireless Networks (FWNs)

Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired networks. This united ubiquitous network will consist of billions of networkable devices with different networking interfaces. A common networking protocol is required to communicate among these devices and interfaces; System Architectur...

متن کامل

A secure authentication and billing architecture for wireless mesh networks

Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for ubiquitous high-speed network access. While much effort has been made to address issues at physical, data link, and network layers, little attention has been paid to the security aspect central to the realistic deployment of WMNs. We propose UPASS, the first known secure authentication and billing architect...

متن کامل

Virtualization architecture using the ID/Locator split concept for Future Wireless Networks (FWNs)

Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired networks. This united ubiquitous network will consist of billions of networkable devices with different networking interfaces. A common networking protocol is required to communicate among these devices and interfaces; System Architectur...

متن کامل

Requirements Analysis for Identity Management in Ambient Environments: The HYDRA Approach

The research field of Ambient Environments and Ubiquitous Computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined Identity (ID) Management System is required that deals with issues like virtual a...

متن کامل

A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems

M2M (machine to machine) applications involving intelligence to ubiquitous environment have been in existence for the past many years. However, its provisioning using mobile technologies raises a new security challenge. Security services such as authentication and key establishment are critical in M2M, especially for healthcare systems. We proposed a simple architecture M2M service to apply any...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010