Handheld Mobile Devices for Remote Monitoring of Factory
نویسندگان
چکیده
منابع مشابه
Practical Strong Security for Mobile Handheld Devices
We present a method for constructing signature schemes for use with mobile handheld devices that mitigates the risk of an attacker forging signatures using key material garnered from a lost handheld. This scheme is forward-secure, meaning that signatures created before a breach are still valid, and server-assisted, meaning that a separate untrusted server must assist the device in signing, ther...
متن کاملInterface Design for Handheld Mobile Devices
Mobile computing has attracted a lot of attention from both the industry and academia in recent years. While a number of mobile applications have been developed, there are no established guidelines on the design of mobile device interfaces. This paper presents our initial efforts to provide a set of practical design guidelines for mobile device interfaces.
متن کاملAudio for Mobile and Handheld Devices
T he AES 29th Conference, Audio for Mobile and Handheld Devices, was held at the conference center (see photo inset) on the beautiful campus of Seoul National University located in the thriving metropolis (background photo) of Seoul, Korea on September 2–4 2006. The conference was a significant milestone for AES. It was the first AES conference held in Asia. It was also the first conference dev...
متن کاملSecure Remote Health Monitoring with Unreliable Mobile Devices
As the nation's healthcare information infrastructure continues to evolve, new technologies promise to provide readily accessible health information that can help people address personal and community health concerns. In particular, wearable and implantable medical sensors and portable computing devices present many opportunities for providing timely health information to health providers, publ...
متن کاملUser Authentication Schemes for Mobile and Handheld Devices
User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Per...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of International Conference on Artificial Life and Robotics
سال: 2016
ISSN: 2188-7829
DOI: 10.5954/icarob.2016.os2-4