Sciweavers

341 search results - page 37 / 69
» The Role of Semantic Locations for Mobile Information Access
Sort
View
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
MHCI
2009
Springer
14 years 3 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
INFOCOM
2000
IEEE
14 years 27 days ago
Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management
Abstract—In this paper, we present the implementation issues of a virtual backbone that supports the operations of the Uniform Quorum System (UQS) and the Randomized Database Gro...
Ben Liang, Zygmunt J. Haas
WIMOB
2008
IEEE
14 years 2 months ago
VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking
—Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the succ...
Marco von Arb, Matthias Bader, Michael Kuhn 0002, ...
ICDCSW
2002
IEEE
14 years 1 months ago
TWSAPI: A Generic Teamwork Services Application Programming Interface
One of the problems faced by large, global organizations and enterprises is to effectively enable their employees to collaborate across locations. People need collaborative work s...
Engin Kirda, Gerald Reif, Harald Gall, Pascal Fenk...