Sciweavers

90 search results - page 5 / 18
» It's Not What You Have, But How You Use It: Compromises in M...
Sort
View
CNSR
2007
IEEE
101views Communications» more  CNSR 2007»
14 years 1 months ago
The Theory of Natural Movement and its Application to the Simulation of Mobile Ad Hoc Networks (MANET)
The theory of natural movement is fundamental to space syntax: a set of theories and methods developed in the late 1970s that seeks, at a general level, to reveal the mutual effec...
Nick Sheep Dalton, Ruth Conroy Dalton
ACSAC
2004
IEEE
13 years 11 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
11 years 10 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
EJIS
2006
105views more  EJIS 2006»
13 years 7 months ago
Activity-based design
In many types of activities, communicative and material activities are so intertwined that the one cannot be understood without taking the other into account. This is true of mari...
Peter Bøgh Andersen
FM
2006
Springer
153views Formal Methods» more  FM 2006»
13 years 11 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner