Sciweavers

123 search results - page 18 / 25
» Cocktail Party on the Mobile
Sort
View
ACSC
2008
IEEE
14 years 1 months ago
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes...
Will Tao, Robert Steele
WCNC
2008
IEEE
14 years 1 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
ICMB
2005
IEEE
114views Business» more  ICMB 2005»
14 years 9 days ago
WLAN Communities and Internet Access Sharing: A Regulatory Overview
The widespread adoption of wireless LAN has paved the way for the emergence of a compelling alternative to cellular networks for obtaining Internet access on the move. This has ge...
Giovanni Camponovo, Davide Cerutti
UIST
2004
ACM
14 years 4 days ago
Augmenting conversations using dual-purpose speech
In this paper, we explore the concept of dual–purpose speech: speech that is socially appropriate in the context of a human– to–human conversation which also provides meanin...
Kent Lyons, Christopher Skeels, Thad Starner, Corn...