Sciweavers

1856 search results - page 85 / 372
» Phoning it in
Sort
View
AINA
2009
IEEE
14 years 2 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
CHI
2009
ACM
14 years 2 months ago
PressureText: pressure input for mobile phone text entry
David C. McCallum, Edward Mak, Pourang Irani, Srir...
PCM
2001
Springer
89views Multimedia» more  PCM 2001»
14 years 2 months ago
Experience of Immersive Virtual World Using Cellular Phone Interface
Tetsuro Ogi, Koji Yamamoto, Toshio Yamada, Michita...