Ubiquitous computing

Results: 2670



#Item
451Identification / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / Identity document / Smart card / Card printer / Ubiquitous computing / Technology / Security

University Campus Card Introduction The University has issued 18,000 student campus cards and plans to issue 2,000 similar cards to staff in April. The major benefit of campus cards is the provision of an enabling techn

Add to Reading List

Source URL: www.nuigalway.ie

Language: English - Date: 2011-07-11 10:19:36
452Privacy / Internet privacy / Ubiquitous computing / Cloud computing / Information privacy / Privacy Office of the U.S. Department of Homeland Security / Ethics / Identity management / Law

PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC) 1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U

Add to Reading List

Source URL: www.cybermatics.org

Language: English
453Technology / Radio-frequency identification / MIFARE / Computing / Wireless / ISO/IEC 14443 / EMV / Smart card / ISO image / Ubiquitous computing / Human–computer interaction / ISO standards

Motorized Reader/Writer Terminal ESTF-4950 Features Options

Add to Reading List

Source URL: www.pdiscan.com

Language: English - Date: 2014-08-12 08:49:19
454Smart card / Technology / Secure Digital / ISO standards / Ubiquitous computing

Microsoft Word - Part A1 ASSD Extension Simplified Specification Ver2.00 Finaldoc

Add to Reading List

Source URL: www.sdcard.org

Language: English - Date: 2014-09-09 01:58:00
455Telecommunications engineering / Mobile computers / Computing / Automatic identification and data capture / Radio-frequency identification / USB flash drive / Universal Serial Bus / Bluetooth / Technology / Wireless / Ubiquitous computing

(logo-border-ID-white.eps)

Add to Reading List

Source URL: www.allflex.com.au

Language: English - Date: 2014-10-30 21:51:18
456Emotion / Ubiquitous computing / Cognitive architecture / Mind / Science / Ethology / Human communication / Human–computer interaction / Scientific revolution

Engineering, Maria Elavumkal

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2015-03-19 13:38:41
457Technology / Conference on Embedded Networked Sensor Systems / International Conference on Information Processing in Sensor Networks / International nongovernmental organizations / Computer science / Association for Computing Machinery / Carlo Ghezzi / Ubiquitous computing / Year of birth missing / Wireless sensor network / Wireless networking / Computing

Kamin Whitehouse 501 Rice Hall • Charlottesville, VA • (HIGHLIGHTS Commonwealth endowed chair

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2014-09-20 21:11:12
458Technology / Automatic identification and data capture / Ubiquitous computing / Radio-frequency identification / Wireless / Image scanner / Data Matrix / Identity document / Passport / Identification / Barcodes / Security

AllScan-ID for Desktop ID & PASSPORT SCANNER Overview: The AllScan-ID is a compact, full page passport scanner in a stylish case. This fast and fully automated ID and passport scanner is designed for data entry applicati

Add to Reading List

Source URL: www.pdiscan.com

Language: English - Date: 2014-08-12 08:49:17
459Graphical user interfaces / Graphical user interface elements / PARC / Technology transfer / Google Chrome / Graphical user interface / Ubiquitous computing / Tablet computer / Computer keyboard / Software / Computing / System software

An Overview of the ParcTab Ubiquitous Computing Experiment Roy Want, Bill N. Schilit, Norman I. Adams, Rich Gold, Karin Petersen, David Goldberg, John R. Ellis and Mark Weiser The PARC TAB system integrates a palm-sized

Add to Reading List

Source URL: www.roywant.com

Language: English - Date: 2005-11-06 23:23:21
460Ubiquitous computing / Wireless / Authentication protocol / Technology / Computing / Information / Automatic identification and data capture / Privacy / Radio-frequency identification

On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol Masoumeh Safkhani1 , Nasour Bagheri1 , Mehdi Hosseinzadeh2 , Mojtaba Eslamnezhad Namin2 , Samad Rostampour2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 04:32:06
UPDATE