Sciweavers

1018 search results - page 27 / 204
» Remote User Authentication Using Public Information
Sort
View
TIFS
2008
145views more  TIFS 2008»
14 years 11 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
ICWN
2004
15 years 1 months ago
An Embedded Healthcare System for Blood Glucose Monitoring in a Body Area Network
This paper presents a Java service platform and hardware design for a handheld healthcare system that enables remote health monitoring using CDMA public wireless networks. Special...
Kil-Ho Ahn, Jae-Wan Park, Dong Ryeol Shin, Ji-Tae ...
CHI
2010
ACM
15 years 6 months ago
OneBusAway: results from providing real-time arrival information for public transit
Public transit systems play an important role in combating traffic congestion, reducing carbon emissions, and promoting compact, sustainable urban communities. The usability of p...
Brian Ferris, Kari Watkins, Alan Borning
ICMCS
2010
IEEE
170views Multimedia» more  ICMCS 2010»
15 years 25 days ago
Enabling genuine eye contact and accurate gaze in remote collaboration
: Enabling Genuine Eye Contact and Accurate Gaze in Remote Collaboration Kar-Han Tan, Ian N. Robinson, Bruce Culbertson, John Apostolopoulos HP Laboratories HPL-2010-96 eye contac...
Kar Han Tan, Ian N. Robinson, W. Bruce Culbertson,...
IJNSEC
2008
145views more  IJNSEC 2008»
14 years 11 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao