Sciweavers

152 search results - page 2 / 31
» Evaluation of Overcluttering Prevention Techniques for Mobil...
Sort
View
DCOSS
2010
Springer
13 years 10 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
WISEC
2010
ACM
13 years 4 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
CHI
2003
ACM
14 years 7 months ago
Multimodal 'eyes-free' interaction techniques for wearable devices
Mobile and wearable computers present input/output problems due to limited screen space and interaction techniques. When mobile, users typically focus their visual attention on na...
Stephen A. Brewster, Joanna Lumsden, Marek Bell, M...
CHI
2009
ACM
14 years 7 months ago
Visualization and interaction techniques for mobile devices
This paper presents ongoing work toward the development of one-handed interaction techniques for mobile devices with a small touch-screen. This work comprises three main parts: th...
Anne Roudaut
HUC
2007
Springer
13 years 11 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...