Sciweavers

3016 search results - page 121 / 604
» Disappearing mobile devices
Sort
View
RFIDSEC
2010
13 years 7 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
SOUPS
2009
ACM
14 years 3 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
MHCI
2005
Springer
14 years 2 months ago
Rolling, rotating and imagining in a virtual mobile world
New mobile devices can be difficult to use because they give users access to powerful computing devices through small interfaces, which typically have limited input facilities. On...
Lynne Baillie, Harald Kunczier, Hermann Anegg
SIGMOD
2004
ACM
128views Database» more  SIGMOD 2004»
14 years 9 months ago
A context-aware methodology for very small data base design
The design of a Data Base to be resident on portable devices and embedded processors for professional systems requires considering both the device memory peculiarities and the mobi...
Cristiana Bolchini, Fabio A. Schreiber, Letizia Ta...
EGOV
2004
Springer
14 years 2 months ago
M-GIS - Mobile and Interoperable Access to Geographic Information
This paper describes an architecture which can be used to access geographic information from mobile devices with limited display and processing characteristics, such as Personal Di...
Jorge Cardoso, Artur Rocha, João Correia Lo...