Sciweavers

674 search results - page 25 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
APNOMS
2006
Springer
15 years 1 months ago
A Profile Based Vertical Handoff Scheme for Ubiquitous Computing Environment
Specifically ubiquitous computing paradigm is based on seamless connectivity. And also to guarantee the seamless connectivity, an intelligent network management between heterogeneo...
Chung-Pyo Hong, Tae-Hoon Kang, Shin-Dug Kim
JCP
2006
120views more  JCP 2006»
14 years 9 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
JIIS
2008
104views more  JIIS 2008»
14 years 9 months ago
Transaction Management for Flash Media Databases in Portable Computing Environments
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast acc...
Siwoo Byun
PERCOM
2005
ACM
15 years 9 months ago
Toward Unlinkable ID Management for Multi-Service Environments
As pervasive computing environments become popular, ID devices, such as smart cards and RFID tags, introduce multi-service environments, in which a user can receive multiple servi...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
INFSOF
2008
98views more  INFSOF 2008»
14 years 9 months ago
Engineering contextual knowledge for autonomic pervasive services
Services for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises the problem...
Gabriella Castelli, Marco Mamei, Franco Zambonelli