Sciweavers

6861 search results - page 90 / 1373
» Security for Ubiquitous Computing
Sort
View
DSVIS
2008
Springer
14 years 12 days ago
A Model-Based Approach to Supporting Configuration in Ubiquitous Systems
This paper presents an approach for representing, and providing computer support for, the configuration of interactive systems, particularly ubiquitous systems, that offers a flexi...
Tony McBryan, Philip D. Gray
PERCOM
2007
ACM
14 years 10 months ago
Context-Aware Model in a Ubiquitous Learning Environment
Cassia Pereira Nino, Jader Marques, Débora ...
FSTTCS
2010
Springer
13 years 8 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
IASTEDSE
2004
14 years 1 days ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
CHI
2010
ACM
14 years 5 months ago
Ubiquitous drums: a tangible, wearable musical interface
Drummers and non-drummers alike can often be seen making percussive gestures on their chests, knees and feet. Ubiquitous Drums enhances this experience by providing musical feedba...
Boris Smus, Mark D. Gross