Sciweavers

10 search results - page 1 / 2
» Verifying Identifier-Authenticity in Ubiquitous Computing En...
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
HUC
2007
Springer
14 years 5 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
UIC
2010
Springer
13 years 9 months ago
A Middleware for Intelligent Environments and the Internet of Things
Interdisciplinary research from the domains of pervasive computing or ubiquitous computing, computer-human-interaction and computer science has led to the development of many intel...
Luis Roalter, Matthias Kranz, Andreas Möller
JUCS
2010
150views more  JUCS 2010»
13 years 9 months ago
Situation-Aware Community Computing Model for Developing Dynamic Ubiquitous Computing Systems
: For many complex and dynamic ubiquitous services, context-aware cooperation can be a solution. However, the way is not yet clear to make individual objects cooperate with each ot...
Youna Jung, Minsoo Kim