Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The following topics are dealt with: ubiquitous and pervasive computing; wireless sensor networks; multimedia systems; P2P networks; Internet applications; distributed systems; ad hoc networks; security models; privacy models; parallel algorithms; and network protocols.
In any systems or environments within a ubiquitous computing context that promotes the concept of users interaction or inter-organization communication, more specifically data sharing and takes users within such context as relevant contextual information, there is the potential for interactions between systems to occur that may affect the security of the overall system. We present a scenario that...
Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification...
Trust management has become a cornerstone for information security and privacy, to enable secure data sharing in pervasive healthcare systems. This paper proposes the use of the opportunistic networks (oppnets) paradigm as a solution for communication and data dissemination in such environment. Oppnet allows communication among nodes by opportunistically connecting devices without relying on any pre-existing...
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security against different attacks, the needed hardware capabilities...
Pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential component in this field and recently more...
The following topics are dealt with: peer-to-peer computing; ubiquitous computing; security of data; mobile ad hoc computer; wireless sensor network; protocols; data mining; distance learning; ID based broadcast signcryption scheme; and service-oriented architecture.
The following topics are dealt with: ubiquitous computing; mobile social network; pervasive medical sensor network security; EagleVision; pervasive mobile device protection system; wireless sensor networks; secure signature; mobile tetherless VoIP-PSTN gateway; IEEE 802.11; wireless LAN; EcoPlex; MOBIX; mobility management; information exchange; mobile context-aware communication; ZigBee; MediNet;...
To address the challenges posed by device capacity and capability, and also the nature of ad-hoc network of pervasive computing, a resource discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this...
Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld devices in a pervasive computing environment. Effective sharing of resources is facilitating tiny pervasive devices to benefit from situations which otherwise would not have been possible due to several limitations (such as poor storage and computational capability). An unavoidable consequence of this...
The following topics are dealt with: mobile ad hoc network; Internet; wireless sensor network; wireless intrusion detection; secure mobile RFID system and pervasive environment.
The following topics were dealt with: ad-hoc networks; Web services and applications; network security and trustworthy systems; P2P computing; scalable computing; agent-based computing; distributed algorithms; distributed data management; wireless sensor networks; autonomic computing and system; innovative networking; multimedia systems; distributed data processing; mobile systems; ubiquitous computing;...
The following topics are dealt with: ubiquitous computing; wireless ad hoc network security; quality of service; TCP/IP; mobility and topology management.
Trust, the fundamental basis of `cooperation' - one of the most important characteristics for the performance of pervasive ad hoc network - is under serious threat with the emergence of counterfeiting and malicious activity. Several constraints exist in the pervasive computing environment such as a device's memory, battery power and computational capability. This results in a high degree of dependence...
Ubiquitous or pervasive computing is a new kind of computing, where specialized elements of hardware and software will have such high level of deployment that their use will be fully integrated with the environment. Augmented reality extends reality with virtual elements but tries to place the computer in a relatively unobtrusive, assistive role. To our knowledge, there is no specialized network middleware...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.