Sciweavers

6861 search results - page 21 / 1373
» Security for Ubiquitous Computing
Sort
View
EUC
2005
Springer
14 years 1 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
ISEM
2006
112views more  ISEM 2006»
13 years 7 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee
CHI
2003
ACM
14 years 7 months ago
Who wants to know what when? privacy preference determinants in ubiquitous computing
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed...
Scott Lederer, Jennifer Mankoff, Anind K. Dey
WMCSA
2002
IEEE
14 years 13 days ago
The Location Stack: A Layered Model for Location in Ubiquitous Computing
Based on five design principles extracted from a survey of location systems, we present the Location Stack, a layered software engineering model for location in ubiquitous comput...
Jeffrey Hightower, Barry Brumitt, Gaetano Borriell...
ICDCSW
2002
IEEE
14 years 14 days ago
An Architecture Concept for Ubiquitous Computing Aware Wearable Computers
In Marc Weiser’s vision of ubiquitous computing, users are located in an environment with potentially thousands of computers around them. Many capabilities of these smart device...
Martin Bauer, Bernd Brügge, Gudrun Klinker, A...