Secure zero configuration in a ubiquitous computing environment

Chris J. Mitchell and Hu, S.

Chris J. Mitchell and Hu, S. Secure zero configuration in a ubiquitous computing environment.

Our Full Text Deposits

Full text access: Open

Full Text - 65.46 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this paper, we discuss the need for zero configuration in a ubiquitous environment. Security issues in ubiquitous environment are identified, and future research directions are outlined.

Information about this Version

This is a version
This version's date is:
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/8328e6a1-6620-ae8f-1ad7-45330810fc2e/1/

Item TypeConference Item (Paper)
TitleSecure zero configuration in a ubiquitous computing environment
AuthorsMitchell, Chris
Hu, S.
Uncontrolled Keywordssecurity, ubiquitous computing, zero configuration,
DepartmentsFaculty of Science\Mathematics

Identifiers

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010


Details