Sciweavers

1856 search results - page 74 / 372
» Phoning it in
Sort
View
ICSNC
2007
IEEE
14 years 3 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
SAINT
2007
IEEE
14 years 3 months ago
Disaster Evacuation Guide: Using a Massively Multiagent Server and GPS Mobile Phones
The ubiquitous environment enables us to build systems that provide individual users with personalized navigation services in cities. In developing such a system, it is necessary ...
Yuu Nakajima, Hironori Shiina, Shohei Yamane, Toru...
ICMCS
2005
IEEE
85views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Personally Customizable Group Navigation System Using Cellular Phones and Wireless Ad-Hoc Communication
Due to the progress of portable computing devices such as PDAs, cellular phones and small sized PCs, many personal navigation systems have been developed which navigate their user...
Yoshitaka Nakamura, Guiquan Ren, Masatoshi Nakamur...
ICCHP
2010
Springer
14 years 2 months ago
Real-Time Walk Light Detection with a Mobile Phone
Crossing an urban traffic intersection is one of the most dangerous activities of a blind or visually impaired person's travel. Building on past work by the authors on the iss...
Volodymyr Ivanchenko, James Coughlan, Huiying Shen
CIS
2006
Springer
14 years 1 months ago
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java
Pairing-based cryptosystems (PBC) have been attracted by researchers in cryptography. Some implementations show that PBC are relatively slower than the standard public key cryptosy...
Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto