Sciweavers

6861 search results - page 77 / 1373
» Security for Ubiquitous Computing
Sort
View
GI
2004
Springer
14 years 3 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
ICCSA
2007
Springer
14 years 2 months ago
Using Adaptative Encryption for Ubiquitous Environments
One of the most important issues for ubiquitous computing is the problem of encrypting content in the devices, as the heterogeneity in the devices nature, capabilities, mobility an...
Antonio Izquierdo, Joaquín Torres Má...
CSE
2009
IEEE
14 years 1 months ago
Where Information Searches for You: The Visible Past Ubiquitous Knowledge Environment for Digital Humanities
— Visible Past proposes a new class of interdisciplinary learning, documenting, knowledge production, and discovery experiences that are anchored in space and time indicators. Th...
Sorin Adam Matei, Eric A. Wernert, Travis Faas
CCS
2005
ACM
14 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
HRI
2007
ACM
14 years 2 months ago
Combining ubiquitous and on-board audio sensing for human-robot interaction
Simon Thompson, Satoshi Kagami, Yoko Sasaki, Yoshi...