Sciweavers

12 search results - page 1 / 3
» Social Authentication Protocol for Mobile Phones
Sort
View
84
Voted
CSE
2009
IEEE
14 years 10 months ago
Social Authentication Protocol for Mobile Phones
Bijan Soleymani, Muthucumaru Maheswaran
127
Voted
MOBISYS
2008
ACM
16 years 6 days ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
105
Voted
SOCIALCOM
2010
14 years 10 months ago
Development of Communication Model for Social Robots Based on Mobile Service
This paper describes an interactive social agent platform which examines anthropomorphic robot features in the mobile phone usage context. Our system is smart phone based robot age...
Ji-Dong Yim, Sungkuk Chun, Keechul Jung, Christoph...
104
Voted
NORDSEC
2009
Springer
15 years 5 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
COMPSAC
2005
IEEE
15 years 6 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho