Sciweavers

6861 search results - page 16 / 1373
» Security for Ubiquitous Computing
Sort
View
PDCAT
2007
Springer
14 years 1 months ago
A Service Discovery Framework for Ubiquitous Computing
This paper presents a novel service discovery framework for ubiquitous computing called Ubiquitous Computing Service Discovery Framework (UCSDF). UCSDF offers a more flexible and ...
Xiaoguang Gu, Hongzhou Shi, Jian Ye, Zhenmin Zhu
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 1 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
HUC
2007
Springer
14 years 1 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
EUC
2005
Springer
14 years 1 months ago
ANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a...
Daeyoung Kim, Tomás López, Seongeun ...