Sciweavers

2358 search results - page 112 / 472
» A Secure Pervasive Environment
Sort
View
PIMRC
2008
IEEE
14 years 3 months ago
A hybrid P2P/Infrastructure platform for personal and social Internet services
—While pure web-based services and P2P technologies are popular for personal and social networking, they both have inherent limitations. A hybrid P2P/Infrastrucutre approach coul...
Dimitris N. Kalofonos, Zoe Antoniou
SPC
2005
Springer
14 years 2 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
PERCOM
2006
ACM
14 years 8 months ago
Situation Determination with Reusable Situation Specifications
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current appr...
Graham Thomson, Sotirios Terzis, Paddy Nixon
ISCAS
2005
IEEE
168views Hardware» more  ISCAS 2005»
14 years 2 months ago
Is home network application acceptable or not?
— Application of the home network is the most important factor to make the future home network environment pervasive. Although home network environment allows us to control appli...
Ikuo Keshi, Yumi Shiraishi, Hiroaki Niwamoto, Mino...
CASCON
2006
127views Education» more  CASCON 2006»
13 years 10 months ago
A model and architecture for situation determination
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current appro...
Graham Thomson, Sotirios Terzis, Paddy Nixon