Secure pervasive computing without a trusted third party | IEEE Conference Publication | IEEE Xplore