Sciweavers

161 search results - page 10 / 33
» Accessing Location and Proximity Information in a Decentrali...
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 8 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
CORR
2004
Springer
147views Education» more  CORR 2004»
13 years 7 months ago
Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness
Wireless sensor networks are finally becoming a reality. In this paper, we present a scalable architecture for using wireless sensor networks in combination with wireless Ethernet...
Ioan Raicu, Owen Richter, Loren Schwiebert, Sheral...
ICMCS
2007
IEEE
141views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Scene Recognition with Camera Phones for Tourist Information Access
Camera phones present new opportunities and challenges for mobile informationassociation and retrieval. The visual input in the real environment is a new and rich interaction moda...
Joo-Hwee Lim, Yiqun Li, Yilun You, Jean-Pierre Che...
UM
2001
Springer
13 years 11 months ago
Personalizing Delivered Information in a Software Reuse Environment
Browsing- and querying-oriented schemes have long served as the principal techniques for software developers to locate software components from a component repository for reuse. Un...
Gerhard Fischer, Yunwen Ye
CCS
2009
ACM
14 years 2 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...