Sciweavers

154 search results - page 17 / 31
» Context and Location-Aware Encryption for Pervasive Computin...
Sort
View
GI
2009
Springer
15 years 2 months ago
Flow-driven Interactions for Adaptive Pervasive Applications
: The era of ubiquitous and pervasive computing technology opens the world for new pervasive applications and services within the physical surroundings. Often users find themselves...
Bashar Altakrouri
EUC
2008
Springer
14 years 11 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
PERCOM
2010
ACM
15 years 1 months ago
Orchestrator: An active resource orchestration framework for mobile context monitoring in sensor-rich mobile environments
— In this paper, we present Orchestrator, an active resource orchestration framework for mobile context monitoring. Emerging pervasive environments will introduce a PAN-scale sen...
Seungwoo Kang, Youngki Lee, Chulhong Min, Younghyu...
SAC
2009
ACM
15 years 2 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
PERCOM
2004
ACM
15 years 9 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva