Pervasive and ubiquitous computing
Supervisor |
|
Suitable for |
Abstract
Projects on pervasive and ubiquitous computing would involve the implementation and analysis of algorithms and protocols in order to investigate and validate properties of pervasive and ubiquitous systems.
Prerequisites:
A sound background in concurrent and distributed systems. At least one of the Concurrency, Computer Security and Concurrent and Distributed Programming courses would be recommended.
Preliminary References
- Satyanarayanan, M., Pervasive computing: vision and challenges, IEEE personal communication, August 2001, Vol. 8, Issue 4, pp. 10-17.
- Long Nguyen and Bill Roscoe. Authenticating ad hoc networks by comparison of short digests. To appear in Journal of Information and Computation. Special Issue of Information and Computation on Computer Security: Foundations and Automated Reasoning, http://web.comlab.ox.ac.uk/oucl/work/long.nguyen/paper.pdf
- Pervasive computing, May 2006, No. 263, http://www.parliament.uk/documents/upload/postpn263.pdf
- F Stajano, Security for Ubiquitous Computing, Wiley 2002.