Sciweavers

6861 search results - page 121 / 1373
» Security for Ubiquitous Computing
Sort
View
CHI
2007
ACM
16 years 4 months ago
Tangible user interfaces in context and theory
Tangible User Interface (TUI) research has become increasingly widespread over the past 25 years. It is an essential component of Ubiquitous Computing and Augmented Reality resear...
Alan F. Blackwell, George W. Fitzmaurice, Lars Eri...
CCS
2010
ACM
15 years 10 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
ACSAC
2009
IEEE
15 years 11 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...