Sciweavers

6861 search results - page 84 / 1373
» Security for Ubiquitous Computing
Sort
View
121
Voted
HUC
2007
Springer
15 years 7 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
107
Voted
ECSCW
2003
15 years 2 months ago
Supporting Collaboration Ubiquitously: An Augmented Learning Environment for Architecture Students
While CSCW research has mostly been focusing on desktop applications there is a growing interest on ubiquitous and tangible computing. We present ethnographic fieldwork and prototy...
Giulio Iacucci, Ina Wagner
101
Voted
PAISI
2007
Springer
15 years 6 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu
106
Voted
CHI
2003
ACM
16 years 1 months ago
The evolution of buildings and implications for the design of ubiquitous domestic environments
This paper considers how we may realize future ubiquitous domestic environments. Building upon previous work on how buildings evolve by Stewart Brand, we suggest the need to broad...
Tom Rodden, Steve Benford
114
Voted
IEEEMM
2006
97views more  IEEEMM 2006»
15 years 23 days ago
Ubiquitous Experience Media
A ubiquitous computing environment will become a solid social infrastructure for recording human experiences in the real world and facilitating human activities. The captured acti...
Kenji Mase, Yasuyuki Sumi, Tomoji Toriyama, Megumu...