Sciweavers

6861 search results - page 79 / 1373
» Security for Ubiquitous Computing
Sort
View
76
Voted
MIDDLEWARE
2007
Springer
15 years 7 months ago
Discovering services with restricted location scope in ubiquitous environments
José Viterbo Filho, Markus Endler, Vagner S...
86
Voted
WICSA
2004
15 years 2 months ago
Real-time Collaboration in Activity-based Architectures
With the growing research into mobile and ubiquitous computing, there is a need for addressing how such infrastructures can support collaboration between nomadic users. We present...
Jakob Bardram, Henrik Bærbak Christensen
CCS
2010
ACM
15 years 7 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
63
Voted
CCS
2008
ACM
15 years 2 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...