TY - GEN
T1 - Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication
AU - Hanumanthappa, Pradeep
AU - Singh, Sanjay
PY - 2012/7/13
Y1 - 2012/7/13
N2 - In todays world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from the fellow user or from the service provider or maybe he wants to control his smart devices at home from wherever he is. In the present era of mobile environments, interactions between the user device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a "Secure Three Way Authentication (STWA)" technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check if the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged.
AB - In todays world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from the fellow user or from the service provider or maybe he wants to control his smart devices at home from wherever he is. In the present era of mobile environments, interactions between the user device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a "Secure Three Way Authentication (STWA)" technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check if the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged.
UR - https://www.scopus.com/pages/publications/84863615218
UR - https://www.scopus.com/pages/publications/84863615218#tab=citedBy
U2 - 10.1109/INNOVATIONS.2012.6207712
DO - 10.1109/INNOVATIONS.2012.6207712
M3 - Conference contribution
AN - SCOPUS:84863615218
SN - 9781467311014
T3 - 2012 International Conference on Innovations in Information Technology, IIT 2012
SP - 107
EP - 112
BT - 2012 International Conference on Innovations in Information Technology, IIT 2012
T2 - 2012 International Conference on Innovations in Information Technology, IIT 2012
Y2 - 18 March 2012 through 20 March 2012
ER -