Security In Pervasive Computing by