Sciweavers

6861 search results - page 87 / 1373
» Security for Ubiquitous Computing
Sort
View
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
14 years 4 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
APNOMS
2006
Springer
14 years 2 months ago
Dynamic Location Management Scheme Using Agent in a Ubiquitous IP-Based Network
IP-based IMT Network Platform(IP2 ) is an ubiquitous platform supporting mobility using two step IP address mode converting
Soo Young Shin, Soo-Hyun Park, Byeong Hwa Jung, Ch...
EUC
2004
Springer
14 years 4 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...
HASE
2008
IEEE
14 years 5 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
EICS
2010
ACM
14 years 3 months ago
Letras: an architecture and framework for ubiquitous pen-and-paper interaction
Paper remains a prevalent medium in mobile usage contexts due to its inherent flexibility and robustness. Mobile computing solutions begin to provide powerful and convenient func...
Felix Heinrichs, Jürgen Steimle, Daniel Schre...