-
1
-
-
83055185772
-
-
Master's thesis, Federal University of Santa Catarina, Florianopolis, SC, Brazil
-
C. C. Rocha, "A Context-Aware Authentication Approach Based on Behavioral Definitions," Master's thesis, Federal University of Santa Catarina, Florianopolis, SC, Brazil, 2010.
-
(2010)
A Context-Aware Authentication Approach Based on Behavioral Definitions
-
-
Rocha, C.C.1
-
2
-
-
85037074313
-
Implicit authentication through learning user behavior
-
E. Shi, Y. Niu, M. Jakobsson, and R. Chow, "Implicit authentication through learning user behavior," Information Security, pp. 99-113, 2011.
-
(2011)
Information Security
, pp. 99-113
-
-
Shi, E.1
Niu, Y.2
Jakobsson, M.3
Chow, R.4
-
3
-
-
54949140060
-
A dynamic authentication scheme for mobile transactions
-
[Online]
-
B. Sathish Babu and P. Venkataram, "A dynamic authentication scheme for mobile transactions," International Journal, vol. 8, no. 1, pp. 59-74, 2009. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10. 1.1.155.4468\&rep=rep1\&type=pdf
-
(2009)
International Journal
, vol.8
, Issue.1
, pp. 59-74
-
-
Sathish Babu, B.1
Venkataram, P.2
-
4
-
-
63049139246
-
Activity-based security scheme for ubiquitous environments
-
[Online]
-
J. Hassan, A. Riaz, and S. Raazi, "Activity-based Security Scheme for Ubiquitous Environments," IPCCC 2008., pp. 475-481, 2008. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs\all.jsp?arnumber=4745102
-
(2008)
IPCCC 2008
, pp. 475-481
-
-
Hassan, J.1
Riaz, A.2
Raazi, S.3
-
5
-
-
77950846494
-
Human identification through image evaluation using secret predicates
-
[Online]
-
H. Jameel, R. Shaikh, H. Lee, and S. Lee, "Human identification through image evaluation using secret predicates," Topics in Cryptology-CT-RSA 2007, vol. 4377, pp. 67-84, 2006. [Online]. Available: http://www.springerlink.com/index/EVL6JGT546674294.pdf
-
(2006)
Topics in Cryptology-CT-RSA 2007
, vol.4377
, pp. 67-84
-
-
Jameel, H.1
Shaikh, R.2
Lee, H.3
Lee, S.4
-
6
-
-
18844418489
-
Context-based access control management in ubiquitous environments
-
[Online]
-
A. Corradi, R. Montanari, and D. Tibaldi, "Context-based access control management in ubiquitous environments," Network Computing and Applications, IEEE International Symposium on, vol. 0, pp. 253-260, 2004. [Online]. Available: http://www.computer.org/portal/web/csdl/doi/10.1109/NCA. 2004.1347784
-
(2004)
Network Computing and Applications, IEEE International Symposium on
, vol.0
, pp. 253-260
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
-
7
-
-
1842688881
-
Context-aware middleware for resource management in the wireless Internet
-
[Online]
-
P. Bellavista, A. Corradi, R. Montanari, and C. Stefanelli, "Context-aware middleware for resource management in the wireless Internet," IEEE Transactions on Software Engineering, vol. 29, pp. 1086-1099, 2003. [Online]. Available: http://www.computer.org/portal/web/csdl/ doi/10.1109/TSE.2003.1265523
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, pp. 1086-1099
-
-
Bellavista, P.1
Corradi, A.2
Montanari, R.3
Stefanelli, C.4
-
8
-
-
70349773629
-
Human-battery interaction on mobile phones
-
A. Rahmati and L. Zhong, "Human-battery interaction on mobile phones," Pervasive and Mobile Computing, vol. 5, no. 5, pp. 465-477, 2009.
-
(2009)
Pervasive and Mobile Computing
, vol.5
, Issue.5
, pp. 465-477
-
-
Rahmati, A.1
Zhong, L.2
-
9
-
-
65349088462
-
What's on users' minds? Toward a usable smart phone security model
-
A. Toninelli, R. Montanari, O. Lassila, and D. Khushraj, "What's on users' minds? toward a usable smart phone security model," IEEE Pervasive Computing, pp. 32-39, 2009.
-
(2009)
IEEE Pervasive Computing
, pp. 32-39
-
-
Toninelli, A.1
Montanari, R.2
Lassila, O.3
Khushraj, D.4
-
10
-
-
35348911373
-
Guest editors' introduction: Security & privacy
-
J. Hong, M. Satyanarayanan, and G. Cybenko, "Guest Editors' Introduction: Security & Privacy," IEEE Pervasive Computing, vol. 6, no. 4, pp. 15-17, 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 15-17
-
-
Hong, J.1
Satyanarayanan, M.2
Cybenko, G.3
-
11
-
-
84900830868
-
Understanding and using context
-
[Online]
-
A. Dey, "Understanding and using context," Personal and ubiquitous computing, vol. 5, no. 1, pp. 4-7, 2001. [Online]. Available: http://portal.acm.org/citation.cfm?id=593572
-
(2001)
Personal and Ubiquitous Computing
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.1
-
12
-
-
33746050930
-
Using activity theory to model context awareness: A qualitative case study
-
Florida, USA, AAAI Press, [Online]
-
J. Cassens and A. Kofod-Petersen, "Using activity theory to model context awareness: a qualitative case study," in Proceedings of the 19th International Florida Artificial Intelligence Research Society Conference, Florida, USA, AAAI Press, 2006, pp. 619-624. [Online]. Available: http://scholar.google.com/scholar?hl=en\&btnG=Search\&q=intitle: Using+Activity+Theory+to+Model+Context+Awareness+:+a+Qualitative+Case+Study\#0
-
(2006)
Proceedings of the 19th International Florida Artificial Intelligence Research Society Conference
, pp. 619-624
-
-
Cassens, J.1
Kofod-Petersen, A.2
-
14
-
-
84855791078
-
A recommendation system considering users' past/current/future contexts
-
[Online]
-
K. Oku, S. Nakajima, J. Miyazaki, S. Uemura, H. Kato, and F. Hattori, "A Recommendation System Considering Users' Past/Current/Future Contexts," ids.csom.umn.edu, pp. 3-7, 2010. [Online]. Available: http://ids.csom.umn.edu/faculty/gedas/cars2010/OkuEtAl-CARS-2010.pdf
-
(2010)
Ids.csom.umn.edu
, pp. 3-7
-
-
Oku, K.1
Nakajima, S.2
Miyazaki, J.3
Uemura, S.4
Kato, H.5
Hattori, F.6
-
15
-
-
1642374016
-
Combining content-based and collaborative filters in an online newspaper
-
Citeseer, [Online]
-
M. Claypool, A. Gokhale, T. Miranda, P. Murnikov, D. Netes, and M. Sartin, "Combining content-based and collaborative filters in an online newspaper," in Proceedings of ACM SIGIR Workshop on Recommender Systems. Citeseer, 1999. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.45.5230\&rep=rep1\&type=pdf
-
(1999)
Proceedings of ACM SIGIR Workshop on Recommender Systems
-
-
Claypool, M.1
Gokhale, A.2
Miranda, T.3
Murnikov, P.4
Netes, D.5
Sartin, M.6
-
16
-
-
77949459582
-
SaTScan: Software for the spatial, temporal, and space-time scan statistics, version 5.1 [computer program]
-
[Online]
-
M. Kulldorff, "SaTScan: software for the spatial, temporal, and space-time scan statistics, version 5.1 [computer program]," Inf Manag Serv, 2005. [Online]. Available: http://scholar.google.com/scholar?hl=en\ &btnG=Search\&q=intitle:SaTScan:+Software+for+the+Spatial,+Temporal, +and+Space-Time+Scan+Statistics\#0
-
(2005)
Inf Manag Serv
-
-
Kulldorff, M.1
-
17
-
-
77957850477
-
An authentication approach based on behavioral profiles
-
Santiago de Compostela, Spain: IEEE, Jun. [Online]
-
J. Lima, C. Rocha, and M. Dantas, "An authentication approach based on behavioral profiles," in Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on. Santiago de Compostela, Spain: IEEE, Jun. 2010, pp. 1-4. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs\-all.jsp? arnumber=5556601
-
(2010)
Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on
, pp. 1-4
-
-
Lima, J.1
Rocha, C.2
Dantas, M.3
|