The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: ubiquitous and pervasive computing; wireless sensor networks; multimedia systems; P2P networks; Internet applications; distributed systems; ad hoc networks; security models; privacy models; parallel algorithms; and network protocols.
In any systems or environments within a ubiquitous computing context that promotes the concept of users interaction or inter-organization communication, more specifically data sharing and takes users within such context as relevant contextual information, there is the potential for interactions between systems to occur that may affect the security of the overall system. We present a scenario that...
Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification...
Trust management has become a cornerstone for information security and privacy, to enable secure data sharing in pervasive healthcare systems. This paper proposes the use of the opportunistic networks (oppnets) paradigm as a solution for communication and data dissemination in such environment. Oppnet allows communication among nodes by opportunistically connecting devices without relying on any pre-existing...
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security against different attacks, the needed hardware capabilities...
Pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential component in this field and recently more...
The following topics are dealt with: peer-to-peer computing; ubiquitous computing; security of data; mobile ad hoc computer; wireless sensor network; protocols; data mining; distance learning; ID based broadcast signcryption scheme; and service-oriented architecture.
The following topics are dealt with: ubiquitous computing; mobile social network; pervasive medical sensor network security; EagleVision; pervasive mobile device protection system; wireless sensor networks; secure signature; mobile tetherless VoIP-PSTN gateway; IEEE 802.11; wireless LAN; EcoPlex; MOBIX; mobility management; information exchange; mobile context-aware communication; ZigBee; MediNet;...
To address the challenges posed by device capacity and capability, and also the nature of ad-hoc network of pervasive computing, a resource discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this...
Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld devices in a pervasive computing environment. Effective sharing of resources is facilitating tiny pervasive devices to benefit from situations which otherwise would not have been possible due to several limitations (such as poor storage and computational capability). An unavoidable consequence of this...
The following topics are dealt with: mobile ad hoc network; Internet; wireless sensor network; wireless intrusion detection; secure mobile RFID system and pervasive environment.
The following topics were dealt with: ad-hoc networks; Web services and applications; network security and trustworthy systems; P2P computing; scalable computing; agent-based computing; distributed algorithms; distributed data management; wireless sensor networks; autonomic computing and system; innovative networking; multimedia systems; distributed data processing; mobile systems; ubiquitous computing;...
The following topics are dealt with: ubiquitous computing; wireless ad hoc network security; quality of service; TCP/IP; mobility and topology management.
Trust, the fundamental basis of `cooperation' - one of the most important characteristics for the performance of pervasive ad hoc network - is under serious threat with the emergence of counterfeiting and malicious activity. Several constraints exist in the pervasive computing environment such as a device's memory, battery power and computational capability. This results in a high degree of dependence...
Ubiquitous or pervasive computing is a new kind of computing, where specialized elements of hardware and software will have such high level of deployment that their use will be fully integrated with the environment. Augmented reality extends reality with virtual elements but tries to place the computer in a relatively unobtrusive, assistive role. To our knowledge, there is no specialized network middleware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.