Sciweavers

637 search results - page 108 / 128
» A Privacy Enhanced Service Architecture for Mobile Users
Sort
View
ISW
2009
Springer
14 years 5 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
TRUST
2010
Springer
14 years 3 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
SIMUTOOLS
2008
13 years 11 months ago
Bridging UMTS and multicast routing in ns-2
In this paper, we present the design and the implementation of a novel scheme for the multicast transmission of data over Universal Mobile Telecommunications System (UMTS) network...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
DELOS
2004
13 years 11 months ago
Hyperdatabase Infrastructure for Management and Search of Multimedia Collections
Abstract. Nowadays, digital libraries are inherently dispersed over several peers of a steadily increasing network. Dedicated peers may provide specialized, computationally expensi...
Michael Mlivoncic, Christoph Schuler, Can Tür...
CCS
2006
ACM
14 years 2 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao