Sciweavers

73 search results - page 8 / 15
» Efficient Authentication for Mobile and Pervasive Computing
Sort
View
ICIW
2007
IEEE
14 years 1 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
SOUPS
2010
ACM
13 years 10 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
PERVASIVE
2010
Springer
13 years 8 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
GLOBECOM
2006
IEEE
14 years 23 days ago
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
– Mobile Ad-hoc Networks (MANETs) are important in pervasive computing systems, in which users discover and utilize various services to achieve their goals. Integrating service d...
Stephen S. Yau, Wei Gao, Dazhi Huang
ACMACE
2008
ACM
13 years 8 months ago
Evaluation of a pervasive game for domestic energy engagement among teenagers
In this paper, we present Power Agent - a pervasive game designed to encourage teenagers and their families to reduce energy consumption in the home. The idea behind this mobile p...
Anton Gustafsson, Magnus Bång