Sciweavers

2358 search results - page 20 / 472
» A Secure Pervasive Environment
Sort
View
FTDCS
2004
IEEE
13 years 11 months ago
An Architectural View of the Entities Required for Execution of Task in Pervasive Space
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide an user the transparency of anywhere, anyplace, anytime computing. Pervasive comp...
K. Kalapriya, S. K. Nandy, V. Satish, R. Uma Mahes...
EEE
2005
IEEE
14 years 1 months ago
Flexible Application Rights Management in a Pervasive Environment
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and ...
Ivana Dusparic, Dominik Dahlem, Jim Dowling
PERCOM
2008
ACM
14 years 7 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini
ECAGENTS
2001
Springer
150views ECommerce» more  ECAGENTS 2001»
14 years 1 days ago
Security Issues in M-Commerce: A Usage-Based Taxonomy
Abstract. M–commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area—and the ra...
Suresh Chari, Parviz Kermani, Sean W. Smith, Leand...
IWRT
2008
156views Communications» more  IWRT 2008»
13 years 9 months ago
A Ubiquitous Knowledge-based System to Enable RFID Object Discovery in Smart Environments
This paper presents an extended framework supported by a suitable dissemination protocol to enable ubiquitous Knowledge Bases (u-KBs) in pervasive RFID environments. A u-KB is a di...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...