Sciweavers

418 search results - page 12 / 84
» Trust Model for Mobile Devices in Ubiquitous Environment
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 16 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICDCSW
2003
IEEE
14 years 1 months ago
Smart Furniture: Improvising Ubiquitous Hot-Spot Environment
We developed Smart Furniture, which extemporaneously converts the legacy non-smart space into a Smart Hot-spot which consists of computational services. Since the Smart Furniture ...
Masaki Ito, Akiko Iwaya, Masato Saito, Kenichi Nak...
EUROSSC
2008
Springer
13 years 10 months ago
Synthesizing Context for a Sports Domain on a Mobile Device
Abstract. In ubiquitous computing environments there are an increasing number and variety of devices that can generate context data. The challenge is to timely acquire, process, an...
Alisa Devlic, Michal Koziuk, Wybe Horsman
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
PERVASIVE
2005
Springer
14 years 2 months ago
Context Modeling for Device- and Location-Aware Mobile Web Applications
Ubiquitous Web systems have to deal with varying context information in order to support context awareness. Accomplishing this requirement necessitates gathering, processing and r...
Michael Hinz, Zoltán Fiala