Sciweavers

Share
ACSW
2003
8 years 10 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
ACSW
2003
8 years 10 months ago
A Survey of Research on Context-Aware Homes
The seamless integration of people, devices and computation will soon become part of our daily life. Sensors, actuators, wireless networks and ubiquitous devices powered by intelli...
Sven Meyer, Andry Rakotonirainy
ACSW
2003
8 years 10 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
ACSW
2003
8 years 10 months ago
Location History in a Low-cost Context Awareness Environment
Location awareness is a crucial part of the context-awareness mechanism for ubicomputing. This paper explores how usefull is the location awareness history for an office based low...
Teddy Mantoro, Chris Johnson
ACSW
2003
8 years 10 months ago
Digital Rights Management for Content Distribution
Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual p...
Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sh...
ACSW
2003
8 years 10 months ago
Security in Mobile Communications: Challenges and Opportunities
The nature of mobile communication, characterised for example by terminals having poor user interface and limited processing capacity, as well as complex combination of network pr...
Audun Jøsang, Gunnar Sanderud
ACSW
2003
8 years 10 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
ACSW
2003
8 years 10 months ago
Middleware for Context Sensitive Mobile Applications
Contextual information such as spatial location can significantly enhance the utility of mobile applications. We introduce the concept of active preferences that represent a comb...
Kenneth A. Hawick, Heath A. James
ACSW
2003
8 years 10 months ago
Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom
This paper describes the development of a ubiquitous computing environment called the iRoom. Built from a foundation of the MIT Metaglue multi-agent software, a base level of func...
Jason B. Scholz, Mark W. Grigg, Paul Prekop, Mark ...
books