Sciweavers

123 search results - page 7 / 25
» Cocktail Party on the Mobile
Sort
View
ATAL
2004
Springer
14 years 4 days ago
RDS: Remote Distributed Scheme for Protecting Mobile Agents
As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
Asnat Dadon-Elichai
ECIS
2003
13 years 8 months ago
Earning m-oney - a situation based approach for mobile business models
Current mobile business models for mobile commerce do not seem promising with regard to substantial revenue streams for mobile network operators as well as mobile service provider...
Stefan Figge, Gregor Schrott, Jan Muntermann, Kai ...
DOA
2001
132views more  DOA 2001»
13 years 8 months ago
Mobile RMI: Supporting Remote Access to Java Server Objects on Mobile Hosts
Java Remote Method Invocation (RMI) is a specification for building distributed object-oriented applications. RMI was designed primarily for use in conventional, wired computing e...
Tom Wall, Vinny Cahill
ACISP
2004
Springer
14 years 4 days ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
GAMESEC
2010
128views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
Tracking Games in Mobile Networks
Abstract. Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must ...
Mathias Humbert, Mohammad Hossein Manshaei, Julien...