Sciweavers

6861 search results - page 74 / 1373
» Security for Ubiquitous Computing
Sort
View
CHES
2006
Springer
156views Cryptology» more  CHES 2006»
14 years 2 months ago
HIGHT: A New Block Cipher Suitable for Low-Resource Device
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous ...
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Li...
INDOCRYPT
2010
Springer
13 years 8 months ago
Getting a Few Things Right and Many Things Wrong
: Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID syste...
Neal Koblitz
CHI
2007
ACM
14 years 10 months ago
NEAT-o-games: ubiquitous activity-based gaming
Yuichi Fujiki, Konstantinos Kazakos, Colin Puri, I...
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 3 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
COORDINATION
2006
Springer
14 years 10 days ago
Enabling Ubiquitous Coordination Using Application Sessions
Abstract. Enabling coordination among ubiquitous computing applicad resources requires programming abstractions and development tools tailored to this unique environment. This pape...
Christine Julien, Drew Stovall