Sciweavers

6861 search results - page 20 / 1373
» Security for Ubiquitous Computing
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 7 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
MSE
2000
IEEE
102views Hardware» more  MSE 2000»
13 years 12 months ago
Ubiquitous Computing and Its Influence on MSE
More than a decade after its invention, Mark Weiser’s vision of ubiquitous computing finally seems to spark many research activities world wide. This article reviews the ideas b...
Max Miihlhiiuser
ECUMN
2007
Springer
14 years 1 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
SACMAT
2004
ACM
14 years 28 days ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
AWCC
2004
Springer
14 years 28 days ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...