627 results on '"Sheikh (Iqbal) Ahamed"'
Search Results
202. Can Technology Improve Participation From Underserved Children and Families in Rehabilitation Research?
203. Sensor-Based Detection and Objective Measurement of Physical and Social Exertional Activities: State of the Art Review (Preprint)
204. A Context Aware Interruption Management System for Mobile Devices.
205. Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications.
206. An Approach for Ensuring Robust Safeguard against Location Privacy Violation.
207. UCFC - Ubiquitous personal Carbon Footprint Calculation Platform.
208. Computational thinking for the sciences: a three day workshop for high school science teachers.
209. S-search: finding RFID tags using scalable and secure search protocol.
210. Preventing multi-query attack in location-based services.
211. Unraveling a blockchain-based framework towards patient empowerment: A scoping review envisioning future smart health technologies
212. ePet: when cellular phone learns to recognize its owner.
213. Trust based security auto-configuration for smart assisted living environments.
214. A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services.
215. ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems.
216. Intelligent Mobile Health Monitoring System (IMHMS).
217. Towards Universal Access to Home Monitoring for Assisted Living Environment.
218. An XML Based Access Control Architecture for Pervasive Computing.
219. An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments.
220. Supporting recovery, privacy and security in RFID systems using a robust authentication protocol.
221. Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols.
222. CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment.
223. FPCS: A Formal Approach for Privacy-Aware Context-Based Services.
224. WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive Environment.
225. ERAP: ECC Based RFID Authentication Protocol.
226. Towards a Simple Secured Searching Protocol for Future RFID Applications.
227. Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
228. A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing.
229. Secured tag identification using EDSA (enhanced distributed scalable architecture).
230. Ubicomp secretary: a web service based ubiquitous computing application.
231. Service sharing with trust in pervasive environment: now it's time to break the jinx.
232. CAT: a context-aware trust model for open and dynamic systems.
233. Smart Tracker: Light Weight Infrastructure-less Assets Tracking solution for Ubiquitous Computing Environment.
234. Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment.
235. A Robust Lightweight Solution for RFID Security.
236. Design and Implementation of EPARK Wireless Parking Payment System Using Pervasive Computing.
237. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment.
238. Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment.
239. An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment.
240. Usability of Mobile Computing Technologies to Assist Cancer Patients.
241. Co-learn: Collaborative Learning Engine a Vision for Pervasive Collaboration in E-Learning.
242. Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments.
243. Privacy in Pervasive Computing and Open Issues.
244. Wellness assistant: a virtual wellness assistant using pervasive computing.
245. S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment.
246. SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment.
247. A Trust Framework for Pervasive Computing Environments.
248. A Survey of Middleware for Sensor Network and Challenges.
249. m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications.
250. A Dependable Device Discovery Approach for Pervasive Computing Middleware.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.