Multi-modal authentication for ubiquitous computing environments

Taekyoung Kwon, Sang Ho Park, Sooyeon Shin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In ubiquitous computing environments, the computer technology will recede into the background of our lives for its ultimate goal, invisibility. For ensuring security and privacy in those environments, both human beings and surrounding devices should be authenticated under the interaction methods that are used for ubiquitous services. However, the invisibility of devices, the adaptiveness of interactions, and the varying performance of devices will make it difficult to achieve it. In this paper, we reconsider authentication for ubiquitous computing environments and propose a conceptual framework for resolving the difficulties.

Original languageEnglish
Title of host publicationUniversal Access in Human-Computer Interaction
Subtitle of host publicationAmbient Interaction - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.
PublisherSpringer Verlag
Pages113-121
Number of pages9
EditionPART 2
ISBN (Print)9783540732808
DOIs
Publication statusPublished - 2007
Event4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 - Beijing, China
Duration: 2007 Jul 222007 Jul 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume4555 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007
CountryChina
CityBeijing
Period07/7/2207/7/27

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Multi-modal authentication for ubiquitous computing environments'. Together they form a unique fingerprint.

Cite this