Sciweavers

686 search results - page 54 / 138
» Supporting Mobile Users in Selecting Target Devices
Sort
View
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
AVI
2006
14 years 11 months ago
Stylus based text input using expanding CIRRIN
CIRRIN [3] is a stylus based text input technique for mobile devices with a touch sensitive display. In this paper we explore the benefit of expanding the letters of CIRRIN to red...
Jared Cechanowicz, Steven Dawson, Matt Victor, Sri...
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
15 years 2 months ago
Fuzzy Rules for HTML Transcoding
With the increasing availability of Web-enabled mobile devices, we are facing the problem to effectively adapt Web content for those devices. For adaptation, Web page structures r...
Robbie Schaefer, Andreas Dangberg, Wolfgang Mü...
ISICT
2003
14 years 11 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
UIST
2010
ACM
14 years 7 months ago
Imaginary interfaces: spatial interaction with empty hands and without visual feedback
Screen-less wearable devices allow for the smallest form factor and thus the maximum mobility. However, current screen-less devices only support buttons and gestures. Pointing is ...
Sean Gustafson, Daniel Bierwirth, Patrick Baudisch