—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Abstract. This paper proposes a door access control system with mobile phones which allows off-line delegations of an access. A model of door access control with mobile phones is ...
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additiona...
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...