@inproceedings{5b589944b5794de98784730901495844,
title = "Authentication for ubiquitous multi domain in pervasive computing using PMI",
abstract = "The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much especially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) that realize authentication through device in case of moved user's direct path who device differs.",
keywords = "Authentication, Multi domain, Pervasive computing, PMI",
author = "Deok, \{Gyu Lee\} and Jong, \{Sik Moon\} and Jong, \{Hyuk Park\} and Im, \{Yeong Lee\}",
year = "2006",
language = "English",
isbn = "3540393684",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "515--524",
booktitle = "High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings",
note = "2nd International Conference on High Performance Computing and Communications, HPCC 2006 ; Conference date: 13-09-2006 Through 15-09-2006",
}