Sciweavers

391 search results - page 64 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
UIC
2010
Springer
13 years 7 months ago
Extracting Social and Community Intelligence from Digital Footprints: An Emerging Research Area
As a result of the recent explosion of sensor-equipped mobile phone market, the phenomenal growth of Internet and social network users, and the large deployment of sensor network i...
Daqing Zhang, Bin Guo, Bin Li, Zhiwen Yu
ICWS
2003
IEEE
13 years 10 months ago
A Web Service Approach to Universal Accessibility in Collaboration Services
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services, for heterogeneous user env...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox, Kang-Seok ...
MOBISYS
2008
ACM
14 years 8 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
NSPW
2003
ACM
14 years 1 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
VL
2002
IEEE
124views Visual Languages» more  VL 2002»
14 years 1 months ago
Supporting the Construction of Real World Interfaces
In recent years, real world objects have been used to reflect information previously shown on the computer screen. While most earlier efforts have required significant developer...
D. Scott McCrickard, David Wrighton, Dillon Busser...