The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
The following topics are dealt with: wireless sensor network; ubiquitous computing; trustworthy computing; ubiquitous data management; embedded wireless communication; pervasive services; cyber-physical system; mobile computing; and mobile network.
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security against different attacks, the needed hardware capabilities...
This paper presents an architectural model for wireless peer-to-peer (WP2P) file sharing system for ubiquitous mobile devices. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. With the popularity of mobile phones in day-to-day activities, P2P file sharing in...
The following topics are dealt with: peer-to-peer computing; ubiquitous computing; security of data; mobile ad hoc computer; wireless sensor network; protocols; data mining; distance learning; ID based broadcast signcryption scheme; and service-oriented architecture.
The following topics are dealt with: ubiquitous computing; mobile social network; pervasive medical sensor network security; EagleVision; pervasive mobile device protection system; wireless sensor networks; secure signature; mobile tetherless VoIP-PSTN gateway; IEEE 802.11; wireless LAN; EcoPlex; MOBIX; mobility management; information exchange; mobile context-aware communication; ZigBee; MediNet;...
The use of mobile handheld devices is expanding rapidly both within the business and individual context. These devices are now essential tools that offer competitive business advantages in todaypsilas growing world of ubiquitous computing environment. The technology advancement has made it possible to embed more facilities in mobile phones. While they provide benefits, they also pose new risks on...
The RFID and sensor network based ubiquitous computing has great potential in medical and healthcare services. Most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically. In this aspect, the mobile device with RFID reader is useful device as a medical assistant....
The following topics are dealt with: mobile ad hoc network; Internet; wireless sensor network; wireless intrusion detection; secure mobile RFID system and pervasive environment.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.