-
1
-
-
84937431479
-
The personal server: Changing the way we think about ubiquitous computing
-
Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M., Light, J.: The personal server: Changing the way we think about ubiquitous computing. In: Ubicomp. (2002) 194-209
-
(2002)
Ubicomp
, pp. 194-209
-
-
Want, R.1
Pering, T.2
Danneels, G.3
Kumar, M.4
Sundar, M.5
Light, J.6
-
2
-
-
33750298095
-
Face-to-face media sharing using wireless mobile devices
-
Pering, T., Nguyen, D.H., Light, J., Want, R.: Face-to-face media sharing using wireless mobile devices. In: Seventh IEEE International Symposium on Multimedia (ISM'05). (2005) 269-276
-
(2005)
Seventh IEEE International Symposium on Multimedia (ISM'05)
, pp. 269-276
-
-
Pering, T.1
Nguyen, D.H.2
Light, J.3
Want, R.4
-
3
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
ACM
-
Smetters, D.K., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: New Security Paradigms Workshop '02, ACM (2002)
-
(2002)
New Security Paradigms Workshop '02
-
-
Smetters, D.K.1
Grinter, R.E.2
-
5
-
-
84941147448
-
-
The Trifinite Group: The car whisperer, http://trifinite.org/trifinite. stuff.carwhisperer.html(2005)
-
(2005)
The Car Whisperer
-
-
-
6
-
-
84941164462
-
-
Slingbox. http://www.slingbox.com (2006)
-
(2006)
-
-
-
7
-
-
84941152047
-
-
Orb Networks, http://www.orb.com (2006)
-
(2006)
-
-
-
8
-
-
84941163324
-
-
GoToMyPC. http://www.gotomypc.com (2006)
-
(2006)
-
-
-
9
-
-
21644455714
-
Securing a remote terminal application with a mobile trusted device
-
Tucson, AZ
-
Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Proceedings of the Annual Computer Security Applications Conference, Tucson, AZ (2004)
-
(2004)
Proceedings of the Annual Computer Security Applications Conference
-
-
Oprea, A.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
12
-
-
33645995393
-
Device-enabled authorization in the grey-system
-
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the grey-system. In: ISC. (2005) 431-445
-
(2005)
ISC
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
13
-
-
0033684451
-
A security infrastructure for distributed Java applications
-
Oakland, CA
-
Balfanz, D., Dean, D., Spreitzer, M.: A security infrastructure for distributed Java applications. In: 21th IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA (2000)
-
(2000)
21th IEEE Computer Society Symposium on Research in Security and Privacy
-
-
Balfanz, D.1
Dean, D.2
Spreitzer, M.3
-
14
-
-
0003226048
-
The KeyNote trust-management system version 2
-
IETF - Network Working Group, The Internet Society
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System Version 2. IETF - Network Working Group, The Internet Society. (1999) RFC 2704.
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
16
-
-
85084162149
-
A general and flexible access-control system for the web
-
San Francisco, CA
-
Bauer, L., Schneider, M.A., Felten, E.W.: A general and flexible access-control system for the web. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Bauer, L.1
Schneider, M.A.2
Felten, E.W.3
-
17
-
-
34548730877
-
A calculus for access control in distributed systems
-
Feigenbaum, J., ed.: Springer Lecture Notes in Computer Science No. 576
-
Abadi, M., Burrows, M., Lampson, B.: A calculus for access control in distributed systems. In Feigenbaum, J., ed.: "Proc. CRYPTO 91", Springer (1992) 1-23 Lecture Notes in Computer Science No. 576.
-
(1992)
Proc. CRYPTO 91
, pp. 1-23
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
-
19
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
7th Security Protocols Workshop. Cambridge, United Kingdom, Springer-Verlag, Berlin Germany
-
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: 7th Security Protocols Workshop. Volume 1796 of Lecture Notes in Computer Science., Cambridge, United Kingdom, Springer-Verlag, Berlin Germany (1999) 172-194
-
(1999)
Lecture Notes in Computer Science
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
20
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA, The Internet Society
-
Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proceedings of the 2002 Network and Distributed Systems Security Symposium (NDSS'02), San Diego, CA, The Internet Society (2002)
-
(2002)
Proceedings of the 2002 Network and Distributed Systems Security Symposium (NDSS'02)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
21
-
-
29144477685
-
Proximal interactions: A direct manipulation technique for wireless networking
-
Rekimoto, J., Ayatsuka, Y., Kohno, M., Oba, H.: Proximal interactions: A direct manipulation technique for wireless networking. In: INTERACT 2003. (2003)
-
(2003)
INTERACT 2003
-
-
Rekimoto, J.1
Ayatsuka, Y.2
Kohno, M.3
Oba, H.4
-
22
-
-
84941147672
-
New generation of ip-phone enabled mobile devices
-
Kohno, M., Rekimoto, J.: New generation of ip-phone enabled mobile devices. In: Mobile HCI 2002. (2002) 319-323
-
(2002)
Mobile HCI 2002
, pp. 319-323
-
-
Kohno, M.1
Rekimoto, J.2
-
23
-
-
33750328286
-
Secure spontaneous device association
-
Kindberg, T., Zhang, K.: Secure spontaneous device association. In: UbiComp 2003. (2003)
-
(2003)
UbiComp 2003
-
-
Kindberg, T.1
Zhang, K.2
-
26
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
San Diego, CA
-
Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D., Stewart, P.: Network-in-a-box: How to set up a secure wireless network in under a minute. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.E.3
Smetters, D.4
Stewart, P.5
-
27
-
-
33750286486
-
Making the impossible easy: Usable PKI
-
Cranor, L.F., Garfinkel, S., eds.: O'Reilly Media, Inc.
-
Balfanz, D., Durfee, G., Smetters, D.: Making the impossible easy: Usable PKI. In Cranor, L.F., Garfinkel, S., eds.: Security and Usability - Designing Secure Systems that People Can Use. O'Reilly Media, Inc. (2005) 319-334
-
(2005)
Security and Usability - Designing Secure Systems That People Can Use
, pp. 319-334
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.3
-
28
-
-
0003286492
-
The TLS protocol version 1.0
-
IETF - Network Working Group, The Internet Society
-
Dierks, T., Allen, C.: The TLS Protocol Version 1.0. IETF - Network Working Group, The Internet Society. (1999) RFC 2246.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
29
-
-
0036957029
-
Challenge: Recombinant computing and the speakeasy approach
-
Atlanta, GA
-
Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F., Izadi, S.: Challenge: Recombinant computing and the Speakeasy approach. In: Proceedings of the The Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002), Atlanta, GA (2002)
-
(2002)
Proceedings of the the Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002)
-
-
Edwards, W.K.1
Newman, M.W.2
Sedivy, J.Z.3
Smith, T.F.4
Izadi, S.5
-
30
-
-
77953077071
-
Designing for serendipity: Supporting end-user configuration of ubiquitous computing environments
-
London, UK
-
Newman, M.W., Sedivy, J.Z., Edwards, W.K., Smith, T.F., Marcelo, K., Neuwirth, C.M., Hong, J.I., Izadi, S.: Designing for serendipity: Supporting end-user configuration of ubiquitous computing environments. In: Proceedings of the Conference on Designing Interactive Systems (DIS '02), London, UK (2002)
-
(2002)
Proceedings of the Conference on Designing Interactive Systems (DIS '02)
-
-
Newman, M.W.1
Sedivy, J.Z.2
Edwards, W.K.3
Smith, T.F.4
Marcelo, K.5
Neuwirth, C.M.6
Hong, J.I.7
Izadi, S.8
-
31
-
-
0038304831
-
User interfaces when and where they are needed: An infrastructure for recombinant computing
-
Paris, France, ACM
-
Newman, M.W., Izadi, S., Edwards, W.K., Smith, T.F., Sedivy, J.Z.: User interfaces when and where they are needed: An infrastructure for recombinant computing. In: Proceedings of the Symposium on User Interface Software and Technology (UIST), Paris, France, ACM (2002)
-
(2002)
Proceedings of the Symposium on User Interface Software and Technology (UIST)
-
-
Newman, M.W.1
Izadi, S.2
Edwards, W.K.3
Smith, T.F.4
Sedivy, J.Z.5
|