Sciweavers

1331 search results - page 160 / 267
» Trusted Mobile Platforms
Sort
View
HUC
1999
Springer
14 years 2 months ago
The Role of Connectivity in Supporting Context-Sensitive Applications
This paper considers the role of network connectivity in supporting context-sensitive applications. A range of context-sensitive applications are analysed with respect to connectiv...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...
ESORICS
2008
Springer
13 years 12 months ago
Location Privacy in Location-Based Services: Beyond TTP-based Schemes
Location-Based Services (LBS) are gaining importance due to the advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBS can jeopardise th...
Agusti Solanas, Josep Domingo-Ferrer, Antoni Mart&...
SEC
2001
13 years 11 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 10 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
PSYCHNOLOGY
2008
112views more  PSYCHNOLOGY 2008»
13 years 9 months ago
Tags and the City
This paper analyzes the findings of a set of field studies that explored the use of near field communication (NFC) tags in a mixed reality environment for providing access to digi...
Minna Isomursu