Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
: Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some messages to a seller (S), neither B nor S can deny having participated in this transactio...
Adapting graphical user interface (GUI) to meet higher level of usability for users is one of the most interesting questions of today’s mobile computation. Users should have GUI ...
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
New challenging deployment scenarios are integrating mobile devices with limited and heterogeneous capabilities that roam among wireless access localities during service provisioni...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli