Sciweavers

391 search results - page 19 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
JCST
2008
98views more  JCST 2008»
13 years 7 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
COMCOM
2008
82views more  COMCOM 2008»
13 years 7 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
CSREASAM
2006
13 years 9 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
PERVASIVE
2008
Springer
13 years 7 months ago
Providing an Integrated User Experience of Networked Media, Devices, and Services through End-User Composition
Networked devices for the storage and rendering of digital media are rapidly becoming ubiquitous in homes throughout the industrialized world. Existing approaches to home media con...
Mark W. Newman, Ame Elliott, Trevor F. Smith
DIMEA
2008
176views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Designing GUI for the user configuration of pervasive awareness applications
The vision of Pervasive and Ubiquitous Computing promises that our future environments will be furnished with an increasing number of computationally augmented artifacts. Conseque...
Eleni Romoudi, Theodosia Fokidou