Sciweavers

304 search results - page 31 / 61
» Trusted Computing in Mobile Action
Sort
View
CHI
1999
ACM
14 years 4 hour ago
Nomadic Radio: Scaleable and Contextual Notification for Wearable Audio Messaging
Mobile workers need seamless access to communication and information services on portable devices. However current solutions overwhelm users with intrusive and ambiguous notificat...
Nitin "Nick" Sawhney, Chris Schmandt
PUC
2006
72views more  PUC 2006»
13 years 7 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
PUC
2000
107views more  PUC 2000»
13 years 7 months ago
Implicit Human Computer Interaction Through Context
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Albrecht Schmidt
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 8 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin