Sciweavers

18 search results - page 3 / 4
» Information Security - The Fourth Wave
Sort
View
ESORICS
2009
Springer
14 years 2 months ago
Access Control in Location-Based Services
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
MHCI
2009
Springer
14 years 2 months ago
User evaluation of lightweight user authentication with a single tri-axis accelerometer
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation ...
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu...
HSNMC
2004
Springer
165views Multimedia» more  HSNMC 2004»
14 years 25 days ago
An Architecture for User Location in Heterogeneous Mobile Networks
Fourth generation mobile networks will allow end-users to roam over different network technologies, such as UMTS, CDMA2000 and Wi-Fi. These mobile networks make it possible to dete...
Maarten Wegdam, Jeroen van Bemmel, Ko Lagerberg, P...
HUC
2009
Springer
14 years 1 days ago
Sonar-based measurement of user presence and attention
We describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electro...
Stephen P. Tarzia, Robert P. Dick, Peter A. Dinda,...

Tutorial
2179views
15 years 7 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel