Sciweavers

203 search results - page 15 / 41
» An Investigation Into Access Control For Mobile Devices
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
HUC
2003
Springer
14 years 23 days ago
Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined
Abstract. Context-aware computing promises a smooth interaction between humans and technology but few studies have been conducted with regards to how autonomously an application sh...
Louise Barkhuus, Anind K. Dey
TROB
2008
154views more  TROB 2008»
13 years 7 months ago
Dynamic Performance of Mobile Haptic Interfaces
Abstract--The increasing demand for virtual reality applications in several scientific disciplines feeds new research perspectives dealing with robotics, automation, and computer s...
Alessandro Formaglio, Domenico Prattichizzo, Feder...
IACR
2011
292views more  IACR 2011»
12 years 7 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
ICC
2007
IEEE
122views Communications» more  ICC 2007»
14 years 1 months ago
Interactive Error Control for Mobile Video Telephony
—Error robust video communication for hand-held devices is a delicate task because of limited computational resources and hostile channel conditions in mobile environments. The l...
Waqar Zia, Tauseef Afzal, Wen Xu, Günther Lie...