Sciweavers

304 search results - page 26 / 61
» Trusted Computing in Mobile Action
Sort
View
ESAS
2007
Springer
14 years 1 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
WMTE
2006
IEEE
14 years 1 months ago
Practical Issues in Mobile Education
Practitioners interested in integrating mobile technology effectively into distance learning programs need to consider both the benefits and limitations of such devices. This pape...
Marguerite Koole
AINA
2005
IEEE
14 years 1 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
CHI
2011
ACM
12 years 11 months ago
PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays
Flexible displays potentially allow for interaction styles that resemble those used in paper documents. Bending the display, e.g., to page forward, shows particular promise as an ...
Byron Lahey, Audrey Girouard, Winslow Burleson, Ro...
CHI
2003
ACM
14 years 8 months ago
SmartPad: a finger-sensing keypad for mobile interaction
This paper introduces SmartPad, a new input device for mobile computers that is an enhanced physical keypad by a finger position sensor. This input device acts as a normal keypad ...
Jun Rekimoto, Haruo Oba, Takaaki Ishizawa