Sciweavers

418 search results - page 59 / 84
» Trust Model for Mobile Devices in Ubiquitous Environment
Sort
View
CCS
2007
ACM
13 years 11 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
ITCC
2005
IEEE
14 years 1 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
IADIS
2004
13 years 9 months ago
Towards Understanding of Factors Influencing User Acceptance of Mobile Payment Systems
M-payments, which refer to payments over a mobile device, have not taken off as fast as predicted. Their slow adoption rates raise many questions about what drives consumer behavi...
Agnieszka Zmijewska, Elaine Lawrence, Robert Steel...
IUI
2006
ACM
14 years 1 months ago
Activity-oriented context-aware adaptation assisting mobile geo-spatial activities
Human geospatial activities often involves the use of geographic information in mobile environment where the context of technology use is dynamic, complex, and unstable, creating ...
Guoray Cai, Yinkun Xue
PERCOM
2008
ACM
14 years 7 months ago
Provably Correct Pervasive Computing Environments
The field of pervasive computing has seen a lot of exciting innovations in the past few years. However, there are currently no mechanisms for describing the properties and capabil...
Anand Ranganathan, Roy H. Campbell