Skip to main content

Security by, and for, converged mobile devices

Publication ,  Conference
Reiter, M
Published in: Lecture Notes in Computer Science
January 1, 2005

Inheriting the vast mobile phone market, converged mobile devices ("smartphones") are poised to become the first ubiquitous personal computing platform. In this talk we detail our vision of the smart-phone as a universal access control device - replacing physical keys, access tokens, etc. - and describe our efforts to address some of the technical challenges that stand in the way of this vision. Our discussion will focus on: techniques to prevent the misuse of a stolen device; novel user interfaces that aid in the secure use of such a device; and the design of an access control framework for the variety of authorization scenarios that such a device must accommodate. We also describe our efforts to deploy this technology in a testbed on the Carnegie Mellon campus. © Springer-Verlag Berlin Heidelberg 2005.

Duke Scholars

Published In

Lecture Notes in Computer Science

DOI

ISSN

0302-9743

Publication Date

January 1, 2005

Volume

3506

Start / End Page

1

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Reiter, M. (2005). Security by, and for, converged mobile devices. In Lecture Notes in Computer Science (Vol. 3506, p. 1). https://doi.org/10.1007/11496618_1
Reiter, M. “Security by, and for, converged mobile devices.” In Lecture Notes in Computer Science, 3506:1, 2005. https://doi.org/10.1007/11496618_1.
Reiter M. Security by, and for, converged mobile devices. In: Lecture Notes in Computer Science. 2005. p. 1.
Reiter, M. “Security by, and for, converged mobile devices.” Lecture Notes in Computer Science, vol. 3506, 2005, p. 1. Scopus, doi:10.1007/11496618_1.
Reiter M. Security by, and for, converged mobile devices. Lecture Notes in Computer Science. 2005. p. 1.

Published In

Lecture Notes in Computer Science

DOI

ISSN

0302-9743

Publication Date

January 1, 2005

Volume

3506

Start / End Page

1

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences