Sciweavers

73 search results - page 11 / 15
» Efficient Authentication for Mobile and Pervasive Computing
Sort
View
PERCOM
2010
ACM
13 years 1 months ago
Using Wi-Fi to save energy via P2P remote execution
Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
Mads Darø Kristensen, Niels Olof Bouvin
MOBISYS
2009
ACM
14 years 7 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
ENTCS
2006
180views more  ENTCS 2006»
13 years 6 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
SOUPS
2009
ACM
14 years 27 days ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
PERCOM
2009
ACM
14 years 1 months ago
NoShake: Content Stabilization for Shaking Screens of Mobile Devices
—Consumer electronics and mobile devices intended for pervasive applications are often subject to shaking that makes their screen difficult to read. To address this usability cha...
Ahmad Rahmati, Clayton Shepard, Lin Zhong