Sciweavers

674 search results - page 2 / 135
» Distributed Certified Information Access for Mobile Devices
Sort
View
MHCI
2007
Springer
15 years 3 months ago
Ad-hoc co-located collaborative work with mobile devices
This paper presents how ad-hoc co-located collaborations can be supported with an arbitrary number of users that only have acces to small-size mobile displays. Our approach is bas...
Kris Luyten, Kristof Verpoorten, Karin Coninx
W4A
2006
ACM
15 years 3 months ago
Mobile phones may be the right devices for supporting developing world accessibility, but is the WWW the right service delivery
In this paper we detail the synergies we have observed between the features and limitations of mobile phones, and the usability and accessibility requirements of rural developing ...
Tapan S. Parikh
80
Voted
UIC
2009
Springer
15 years 4 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
PERCOM
2005
ACM
15 years 9 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
82
Voted
LISA
2008
14 years 11 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang