Sciweavers

123 search results - page 12 / 25
» Cocktail Party on the Mobile
Sort
View
SAC
2004
ACM
14 years 4 days ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
ELPUB
2003
ACM
13 years 12 months ago
Mobile Internet Services in Japan and Europe: Examining Industrial Organisation in Relation to Interactive Electronic Publishing
Based on our field and desk-research , this paper will discuss the current situation of mobile telephones in relation to electronic publishing—a convergence that remains yet to ...
Myriam Diocaretz, Richard Tee
ATAL
2008
Springer
13 years 8 months ago
A mobile agent approach to opportunistic harvesting in wireless sensor networks
This demonstration illustrates the feasibility of harvesting data from a WSN by interested parties, either in the WSN coverage area or in a remote location. Embedded and mobile ag...
Richard Tynan, Conor Muldoon, Michael J. O'Grady, ...
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 6 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
PERVASIVE
2004
Springer
14 years 2 days ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...