-
1
-
-
84862445086
-
The challenges and opportunities of integrating the physical world and networked systems
-
John Barton & Tim Kindberg (2001). "The challenges and opportunities of integrating the physical world and networked systems". HPL Technical report HPL-2001-18, available as http://www.champignon.net/ TimKindberg/Mobi comChallengeAsTR.pdf.
-
(2001)
HPL Technical Report
, vol.HPL-2001-18
-
-
Barton, J.1
Kindberg, T.2
-
2
-
-
0035281893
-
A webbased nomadic computing system
-
To appear, Elsevier
-
Tim Kindberg & John Barton (2001). "A WebBased Nomadic Computing System". To appear, Computer Networks, Elsevier. Available as http://www.cooltown.hp.com/papers/nomadic/n omadic.htm.
-
(2001)
Computer Networks
-
-
Kindberg, T.1
Barton, J.2
-
3
-
-
0013142808
-
People, places, things: Web presence for the real world
-
Tim Kindberg et al. (2000). "People, Places, Things: Web Presence for the Real World". In proceedings WMCSA2000. Available as http://www.cooltown.hp.com/papers/webpres/webpresence.htm.
-
(2000)
Proceedings WMCSA2000
-
-
Kindberg, T.1
-
4
-
-
84958985122
-
Creating web representations for places
-
Springer
-
Debbie Caswell & Philippe Debaty (2000). "Creating web representations for places". Proceedings Handheld and Ubiquitous Computing 2000, Springer, pp. 114-126. Available as http://www.cooltown.hp.com/ papers/placeman/placesHUC2000.pdf.
-
(2000)
Proceedings Handheld and Ubiquitous Computing 2000
, pp. 114-126
-
-
Caswell, D.1
Debaty, P.2
-
5
-
-
0026483978
-
The active badge location system
-
R. Want, A. Hopper, V. Falcao, and J. Gibbons (1992). "The active badge location system". ACM Transactions on Information Systems, vol. 10, pp. 91-102.
-
(1992)
ACM Transactions on Information Systems
, vol.10
, pp. 91-102
-
-
Want, R.1
Hopper, A.2
Falcao, V.3
Gibbons, J.4
-
6
-
-
1542341270
-
Location-based authentication: Grounding cyberspace for better security
-
February
-
Dorothy E. Denning and Peter F. MacDoran (1996). "Location-Based Authentication: Grounding Cyberspace for Better Security". In Computer Fraud & Security, February. Available as http://www.cosc.georgetown.edu/ ~denning/infosec/Grounding.txt.
-
(1996)
Computer Fraud & Security
-
-
Denning, D.E.1
MacDoran, P.F.2
-
7
-
-
0003337018
-
Transport layer security
-
T. Dierks and C. Allen (1999). "Transport Layer Security". RFC 2246. www.ietf.org.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
8
-
-
0003080798
-
The anatomy of a context-aware application
-
Seattle, Washington, USA, August
-
A. Harter, A. Hopper, P. Steggles, A. Ward, P. Webster. "The Anatomy of a Context-Aware Application". Proc. 5th Annual ACM/IEEE Int'l Conf. on Mobile Computing and Networking, Seattle, Washington, USA, August 1999, pp. 59-68.
-
(1999)
Proc. 5th Annual ACM/IEEE Int'l Conf. on Mobile Computing and Networking
, pp. 59-68
-
-
Harter, A.1
Hopper, A.2
Steggles, P.3
Ward, A.4
Webster, P.5
-
9
-
-
0013398251
-
Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
-
SEDEP Paris
-
Y. Desmedt. "Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them," SecuriCom'88, SEDEP Paris, 1988, pp 15-17.
-
(1988)
SecuriCom'88
, pp. 15-17
-
-
Desmedt, Y.1
-
10
-
-
84976295016
-
Distance-bounding protocols
-
Lecture Notes in Computer Science, no. 765, SpringerVerlag
-
S. Brands and D. Chaum, "Distance-Bounding Protocols," Proc. EUROCRYPT '93, Lecture Notes in Computer Science, no. 765, SpringerVerlag, pp. 344-359.
-
Proc. EUROCRYPT '93
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
|