Sciweavers

33 search results - page 3 / 7
» Cell Identification Codes for Tracking Mobile Users
Sort
View
ISMAR
2009
IEEE
15 years 6 months ago
Mobile augmented reality based 3D snapshots
: In this paper, we present a mobile augmented reality application that is based on the acquisition of user-generated content obtained by 3D snapshotting. To take a 3D snapshot of ...
Peter Keitler, Frieder Pankratz, Björn Schwer...
MONET
2007
106views more  MONET 2007»
14 years 11 months ago
Shakra: Tracking and Sharing Daily Activity Levels with Unaugmented Mobile Phones
This paper explores the potential for use of an unaugmented commodity technology—the mobile phone— as a health promotion tool. We describe a prototype application that tracks t...
Ian Anderson, Julie Maitland, Scott Sherwood, Loui...
CCS
2007
ACM
15 years 3 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
COMCOM
2008
100views more  COMCOM 2008»
14 years 11 months ago
The impact of code allocation on the multiple access interference in WCDMA systems
Code allocation has a significant impact on the performance of Code Division Multiple Access (CDMA) systems. For the uplink direction, in 3G Wideband CDMA (WCDMA) cellular systems...
Thamer Al-Meshhadany, Wessam Ajib
CSFW
2000
IEEE
15 years 3 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi