Sciweavers

745 search results - page 22 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
HUC
2007
Springer
14 years 2 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
PERCOM
2004
ACM
14 years 8 months ago
On Negotiating Automatic Device Configuration in Smart Environments
As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethica...
Kay Connelly, Ashraf Khalil
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 2 months ago
Multi-Device Seamless Service by User-Oriented Session in All-IP Network
—Evolutionary development towards all-IP networks will have various kinds of devices connected to the Internet. In such the ubiquitous networking environment with the features of...
Naoki Imai, Manabu Isomura, Hiroki Horiuchi
ETFA
2008
IEEE
14 years 3 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth