Sciweavers

2358 search results - page 24 / 472
» A Secure Pervasive Environment
Sort
View
FC
2007
Springer
104views Cryptology» more  FC 2007»
14 years 1 months ago
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...
Jakob Illeborg Pagter, Marianne Graves Petersen
COMPSAC
2009
IEEE
14 years 2 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
PERCOM
2009
ACM
14 years 2 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
14 years 2 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...
SPC
2005
Springer
14 years 1 months ago
Security Issues for Pervasive Personalized Communication Systems
Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal p...
Bertin Klein, Tristan Miller, Sandra Zilles