Sciweavers

858 search results - page 117 / 172
» User Authentication in Sensor Networks
Sort
View
PERCOM
2009
ACM
15 years 4 months ago
Speech as a Feedback Modality for Smart Objects
—One part of the vision of ubiquitous computing is the integration of sensing and actuation nodes into everyday objects, clothes worn on the body, and in large numbers into the e...
Clemens Lombriser, Andreas Bulling, Andreas Breite...
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 10 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 3 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
WMASH
2004
ACM
15 years 3 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
SOCIALCOM
2010
14 years 7 months ago
Building Mobile Social Network with Semantic Relation Using Bayesian NeTwork-based Life-log Mining
Mobile devices such as cell phone, PDA and smart phone have been so popularized that they are to be a necessity for everyday life. These mobile devices can be very useful tools to ...
Han-Saem Park, Sung-Bae Cho