Sciweavers

6861 search results - page 84 / 1373
» Security for Ubiquitous Computing
Sort
View
HUC
2007
Springer
14 years 4 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
ECSCW
2003
13 years 11 months ago
Supporting Collaboration Ubiquitously: An Augmented Learning Environment for Architecture Students
While CSCW research has mostly been focusing on desktop applications there is a growing interest on ubiquitous and tangible computing. We present ethnographic fieldwork and prototy...
Giulio Iacucci, Ina Wagner
PAISI
2007
Springer
14 years 4 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu
CHI
2003
ACM
14 years 10 months ago
The evolution of buildings and implications for the design of ubiquitous domestic environments
This paper considers how we may realize future ubiquitous domestic environments. Building upon previous work on how buildings evolve by Stewart Brand, we suggest the need to broad...
Tom Rodden, Steve Benford
IEEEMM
2006
97views more  IEEEMM 2006»
13 years 10 months ago
Ubiquitous Experience Media
A ubiquitous computing environment will become a solid social infrastructure for recording human experiences in the real world and facilitating human activities. The captured acti...
Kenji Mase, Yasuyuki Sumi, Tomoji Toriyama, Megumu...