Zum Hauptinhalt springen

Showing 1–2 of 2 results for author: Shetty, K S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1208.4321  [pdf, other

    cs.LO

    Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol

    Authors: Swaraj Bhat, Pradeep B. H, Keerthi S. Shetty, Sanjay Singh

    Abstract: In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may cause private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose and model the technique of ownership authenticatio… ▽ More

    Submitted 21 August, 2012; originally announced August 2012.

    Comments: 16 pages, 7 figures,Submitted to ADCOM 2012

  2. Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS

    Authors: Keerthi S. Shetty, Sanjay Singh

    Abstract: Over the past couple of years, the extent of the services provided on the mobile devices has increased rapidly. A special class of service among them is the Location Based Service(LBS) which depends on the geographical position of the user to provide services to the end users. However, a mobile device is still resource constrained, and some applications usually demand more resources than a mobile… ▽ More

    Submitted 8 November, 2011; originally announced November 2011.

    Comments: 11 pages, 10 figures

    Journal ref: International Journal of UbiComp (IJU), vol.2, no.4, 2011, pp.37-49