Sciweavers

418 search results - page 18 / 84
» Trust Model for Mobile Devices in Ubiquitous Environment
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Communication Context for Adaptive Mobile Applications
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
USS
2008
13 years 11 months ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
IICS
2001
Springer
14 years 1 months ago
Hardware Security Concept for Spontaneous Network Integration of Mobile Devices
In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage ...
Igor Sedov, Marc Haase, Clemens H. Cap, Dirk Timme...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
Personal Network Routing Protocol (PNRP) for Personal Ubiquitous Environments
— The proliferation of heterogeneous devices, ranging from mobile communication to home electronics and their internetworking have resulted into the development of a "person...
Usman Javaid, Djamal-Eddine Meddour, Tinku Mohamed...
MOBIQUITOUS
2007
IEEE
14 years 2 months ago
Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
Wei Gao