The Community for Technology Leaders
Green Image
Issue No. 04 - October-December (2007 vol. 6)
ISSN: 1536-1268
pp: 31-39
Ford Long Wong , University of Cambridge
Frank Stajano , University of Cambridge
Many security protocols were designed to run over inherently insecure channels such as ad hoc radio or the packet-switched Internet. However, they can be strengthened with additional transmissions over other lower-capacity channels, commonly found in ubicomp environments, that offer a different mix of security properties. A single protocol might exploit different channels for different messages in its trace. The authors demonstrate this point by presenting and discussing several security protocols for ubicomp pairing and group key agreement. This article is part of a special issue on security and privacy.
security protocols, key agreement, channels, authentication, commitment
Ford Long Wong, Frank Stajano, "Multichannel Security Protocols", IEEE Pervasive Computing, vol. 6, no. , pp. 31-39, October-December 2007, doi:10.1109/MPRV.2007.76
100 ms
(Ver 3.3 (11022016))