Sciweavers

2358 search results - page 105 / 472
» A Secure Pervasive Environment
Sort
View
PERVASIVE
2008
Springer
13 years 9 months ago
Microsearch: When Search Engines Meet Small Devices
Abstract. In this paper, we present Microsearch, a search system suitable for small devices used in ubiquitous computing environments. Akin to a desktop search engine, Microsearch ...
Chiu Chiang Tan, Bo Sheng, Haodong Wang, Qun Li
PERVASIVE
2011
Springer
12 years 11 months ago
Hybrid Prototyping by Using Virtual and Miniature Simulation for Designing Spatial Interactive Information Systems
Abstract. In this paper, we introduce CityCompiler, an integrated environment for the iteration-based development of spatial interactive systems. CityCompiler visualizes interactiv...
Yasuto Nakanishi, Koji Sekiguchi, Takuro Ohmori, S...
SASO
2007
IEEE
14 years 3 months ago
Adaptive SSL: Design, Implementation and Overhead Analysis
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Christiaan J. Lamprecht, Aad P. A. van Moorsel
ACSAC
1999
IEEE
14 years 1 months ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...
JCM
2006
112views more  JCM 2006»
13 years 9 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng