Sciweavers

313 search results - page 40 / 63
» Privacy in Location-Aware Computing Environments
Sort
View
ACSAC
2000
IEEE
14 years 7 days ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
IEEEARES
2007
IEEE
14 years 2 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
CSFW
2006
IEEE
14 years 1 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
HUC
2009
Springer
14 years 13 days ago
Ubicomp4D: infrastructure and interaction for international development--the case of urban indian slums
This paper attempts to re-imagine ubiquitous computing for populations in low-income and information-challenged environments. We examine information infrastructures in midsized ur...
Nithya Sambasivan, Nimmi Rangaswamy, Ed Cutrell, B...
CRITICAL
2005
13 years 9 months ago
Involving non-players in pervasive games
In traditional computer games, it is not uncommon for the game world to be inhabited by numerous computergenerated characters, Non-Player Characters (NPCs). In pervasive games, pl...
Jenny Niemi, Susanna Sawano, Annika Waern