Sciweavers

391 search results - page 37 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 2 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
WWW
2008
ACM
14 years 9 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
SAINT
2007
IEEE
14 years 3 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
ACMACE
2008
ACM
13 years 10 months ago
Evaluation of a pervasive game for domestic energy engagement among teenagers
In this paper, we present Power Agent - a pervasive game designed to encourage teenagers and their families to reduce energy consumption in the home. The idea behind this mobile p...
Anton Gustafsson, Magnus Bång
EUC
2005
Springer
14 years 2 months ago
A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments
Abstract. In the future, homes will have numerous intelligent communicating devices, and the user would like to configure and coordinate their actions. Appliances and people in in...
Victor Zamudio, Victor Callaghan, Jeannette Shiaw-...