Sciweavers

2394 search results - page 430 / 479
» Implementing Mobile Haskell
Sort
View
ADT
2010
13 years 7 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
CGF
2008
153views more  CGF 2008»
13 years 7 months ago
Context Aware Terrain Visualization for Wayfinding and Navigation
To assist wayfinding and navigation, the display of maps and driving directions on mobile devices is nowadays commonplace. While existing system can naturally exploit GPS informat...
Sebastian Möser, Patrick Degener, Roland Wahl...
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 7 months ago
The Privacy Coach: Supporting customer privacy in the Internet of Things
The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase c...
Gerben Broenink, Jaap-Henk Hoepman, Christian van ...
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 7 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 7 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa