Sciweavers

418 search results - page 32 / 84
» Trust Model for Mobile Devices in Ubiquitous Environment
Sort
View
SAC
2006
ACM
14 years 2 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
WMTE
2005
IEEE
14 years 2 months ago
A Multi-Model Approach for Supporting the Personalization of Ubiquitous Learning Applications
An additional platform for supporting learning in the same physical space in which it takes place, is now available owing to the continuous advancement of wireless and mobile tech...
Rosa G. J. Paredes, Hiroaki Ogata, Yoneo Yano, Ger...
TC
2008
13 years 8 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
ACISP
2006
Springer
14 years 2 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
ICDCSW
2003
IEEE
14 years 1 months ago
Entry Points into a Smart Campus Environment - Overview of the ETHOC System
The university campus is an interesting application environment for the ubiquitous computing paradigm: a large number of users share a substantial amount of their information need...
Michael Rohs, Jürgen Bohn