Sciweavers

148 search results - page 3 / 30
» Implementing identity provider on mobile phone
Sort
View
SAC
2011
ACM
12 years 8 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
MHCI
2009
Springer
14 years 16 days ago
Poker surface: combining a multi-touch table and mobile phones in interactive card games
In this paper, we introduce the design and implementation of a digital card game that combines mobile phone gestures and multitouch tabletop interactions. Conceptually based on in...
Alireza Sahami Shirazi, Tanja Döring, Pouyan ...
AUTONOMICS
2007
ACM
13 years 10 months ago
Facet: towards a smart camera network of mobile phones
Smart camera networks provide the opportunity to detect, classify, and trace visual events by means of a wireless network of embedded computing devices equipped with camera sensor...
Philipp Bolliger, Moritz Köhler, Kay Röm...
MOBISYS
2009
ACM
14 years 6 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
ICDIM
2007
IEEE
14 years 7 days ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel