Sciweavers

6861 search results - page 90 / 1373
» Security for Ubiquitous Computing
Sort
View
106
Voted
DSVIS
2008
Springer
15 years 2 months ago
A Model-Based Approach to Supporting Configuration in Ubiquitous Systems
This paper presents an approach for representing, and providing computer support for, the configuration of interactive systems, particularly ubiquitous systems, that offers a flexi...
Tony McBryan, Philip D. Gray
77
Voted
PERCOM
2007
ACM
16 years 10 days ago
Context-Aware Model in a Ubiquitous Learning Environment
Cassia Pereira Nino, Jader Marques, Débora ...
FSTTCS
2010
Springer
14 years 10 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
114
Voted
IASTEDSE
2004
15 years 2 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
85
Voted
CHI
2010
ACM
15 years 7 months ago
Ubiquitous drums: a tangible, wearable musical interface
Drummers and non-drummers alike can often be seen making percussive gestures on their chests, knees and feet. Ubiquitous Drums enhances this experience by providing musical feedba...
Boris Smus, Mark D. Gross