{"title":"保护无线普适计算环境中的自发通信","authors":"Dongwan Shin","doi":"10.1109/ISM.2005.100","DOIUrl":null,"url":null,"abstract":"Spontaneous communications for either personal or shared activities are becoming very common in wireless pervasive computing environments. However, there still remain challenging problems in this type of communications, especially their security over ad-hoc wireless channels. In this paper we present an approach to using a visual code system in order to establish secure spontaneous communications among wireless devices in pervasive computing environments. After briefly discussing the visual code system, we describe two distinct models of spontaneous communications, and then discuss how the visual code system can be leveraged in order to secure spontaneous communications in those models. We also demonstrate our approach through a proof-of-concept implementation.","PeriodicalId":322363,"journal":{"name":"Seventh IEEE International Symposium on Multimedia (ISM'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Securing spontaneous communications in wireless pervasive computing environments\",\"authors\":\"Dongwan Shin\",\"doi\":\"10.1109/ISM.2005.100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Spontaneous communications for either personal or shared activities are becoming very common in wireless pervasive computing environments. However, there still remain challenging problems in this type of communications, especially their security over ad-hoc wireless channels. In this paper we present an approach to using a visual code system in order to establish secure spontaneous communications among wireless devices in pervasive computing environments. After briefly discussing the visual code system, we describe two distinct models of spontaneous communications, and then discuss how the visual code system can be leveraged in order to secure spontaneous communications in those models. We also demonstrate our approach through a proof-of-concept implementation.\",\"PeriodicalId\":322363,\"journal\":{\"name\":\"Seventh IEEE International Symposium on Multimedia (ISM'05)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Seventh IEEE International Symposium on Multimedia (ISM'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISM.2005.100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh IEEE International Symposium on Multimedia (ISM'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISM.2005.100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing spontaneous communications in wireless pervasive computing environments
Spontaneous communications for either personal or shared activities are becoming very common in wireless pervasive computing environments. However, there still remain challenging problems in this type of communications, especially their security over ad-hoc wireless channels. In this paper we present an approach to using a visual code system in order to establish secure spontaneous communications among wireless devices in pervasive computing environments. After briefly discussing the visual code system, we describe two distinct models of spontaneous communications, and then discuss how the visual code system can be leveraged in order to secure spontaneous communications in those models. We also demonstrate our approach through a proof-of-concept implementation.