Sciweavers

2507 search results - page 463 / 502
» Wireless Network Information Flow
Sort
View
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
WWW
2008
ACM
14 years 8 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
PERCOM
2008
ACM
14 years 7 months ago
CoWSAMI: Interface-aware context gathering in ambient intelligence environments
In this paper we present CoWSAMI, a middleware infrastructure that enables context awareness in open ambient intelligence environments, consisting of mobile users and context sour...
Dionysis Athanasopoulos, Apostolos Zarras, Valéri...
PERCOM
2008
ACM
14 years 7 months ago
MAGIC Broker: A Middleware Toolkit for Interactive Public Displays
Large screen displays are being increasingly deployed in public areas for advertising, entertainment, and information display. Recently we have witnessed increasing interest in su...
Aiman Erbad, Michael Blackstock, Adrian Friday, Ro...
PERCOM
2008
ACM
14 years 7 months ago
Estimating the Energy Consumption in Pervasive Java-Based Systems
We define and evaluate a framework for estimating the energy consumption of pervasive Java-based software systems. The framework's primary objective is to enable an engineer ...
Chiyoung Seo, Sam Malek, Nenad Medvidovic