Ubiquitous computing

Results: 2670



#Item
871Ubiquitous computing / Wireless / University of Melbourne / Caval / Kaval / Baillieu / Technology / Asian culture / Music / Automatic identification and data capture / Privacy / Radio-frequency identification

Microsoft PowerPoint - Melbourne Presentation July Forum.ppt

Add to Reading List

Source URL: www.caval.edu.au

Language: English - Date: 2008-05-26 22:16:03
872Privacy / Ubiquitous computing / Internet privacy / Home automation / Ambient intelligence / Ethics / Identity management / Law

The Heterogeneous, Evolving Smart Home: Friend or Foe? Blase Ur Carnegie Mellon University 5000 Forbes Ave. Pittsburgh, PA 15213

Add to Reading List

Source URL: www.zpac.ch

Language: English - Date: 2015-03-11 10:17:19
873Business / Identity management / Social issues / Human rights / Ubiquitous computing / Radio-frequency identification / Consumer privacy / Internet privacy / Privacy / Ethics / Technology

Privacy Technologies in the Information Society Josep Domingo-Ferrer Rovira i Virgili University http://unescoprivacychair.urv.cat May 17, 2007

Add to Reading List

Source URL: unescoprivadesa.urv.cat

Language: English - Date: 2014-04-08 04:52:13
874ISO standards / Build automation / Ubiquitous computing / MIFARE / Near field communication / Configure script / Crypto-1 / Autoconf / Automake / Software / Wireless / Compiling tools

HACKING MIFARE CLASSIC Disclaimer: Please try this at home  Kishan Gupta This short paper is meant to get started to implement Dark-side Attack by Courtois and recover keys

Add to Reading List

Source URL: www.nicolascourtois.com

Language: English - Date: 2011-11-05 17:39:08
875Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Data / Hamming weight / Authentication protocol / Password authentication protocol / Information / Computing / Automatic identification and data capture

Yet Another Ultralightweight Authentication Protocol that is Broken Gildas Avoine, Xavier Carpent Universit´e catholique de Louvain B-1348 Louvain-la-Neuve Belgium

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 06:16:06
876Automatic identification and data capture / Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Transmission Control Protocol / Chebyshev polynomials / X Window System / Software / Computing / Mathematical analysis

Weaknesses in a Recently Proposed RFID Authentication Protocol Mete Akg¨ un1 , and M. Ufuk C ¸ aˇglayan2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-18 04:24:22
877Waste management / Radio-frequency identification / Weighing scale / Waste collection / Electronic waste / Waste / Automatic identification and data capture / Ubiquitous computing / Technology

Chassis Scale Chassis Scale The scale is approved for financial transactions, ie. billing based on weight. The system helps the driver to optimize the utilization rate of

Add to Reading List

Source URL: www.botek.co.uk

Language: English - Date: 2013-09-30 04:38:32
878ISO standards / Ubiquitous computing / Card printer / Stationery / Smart card / Contactless smart card / Printer / Magnetic stripe card / Dye-sublimation printer / Printing / Computer printers / Technology

PDF Document

Add to Reading List

Source URL: grics.ca

Language: English - Date: 2014-09-09 13:45:26
879Marketing / Dispute resolution / Personal selling / Sales / Communications protocol / Information security / Oracle Corporation / Trust negotiation / Oracle Database / Business / Negotiation / Computing

Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments Venkatraman Ramakrishna Peter Reiher

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2009-07-27 19:05:15
880Ubiquitous computing / Wireless / Physical Unclonable Function / Technology / Authentication protocol / Telecommunications engineering / Computing / Automatic identification and data capture / Privacy / Radio-frequency identification

Security Analysis of a PUF based RFID Authentication Protocol Masoumeh Safkhani1 , Nasour Bagheri2 and Majid Naderi1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 03:59:55
UPDATE