Sciweavers

152 search results - page 16 / 31
» Securing Communications in the Smart Home
Sort
View
ISI
2008
Springer
13 years 7 months ago
Secure remote control model for information appliances
Abstract--Recently, Lee et al. proposed a Remote Authentication Model of Information Appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network o...
Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
14 years 2 months ago
Environment Recognition Based on Human Actions Using Probability Networks
To realize context aware applications for smart home environments, it is necessary to recognize function or usage of objects as well as categories of them. On conventional researc...
Hiroshi Miki, Atsuhiro Kojima, Koichi Kise
ICICS
1997
Springer
13 years 12 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
IJNSEC
2006
98views more  IJNSEC 2006»
13 years 7 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
EMSOFT
2005
Springer
14 years 1 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander