As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
Current mobile business models for mobile commerce do not seem promising with regard to substantial revenue streams for mobile network operators as well as mobile service provider...
Stefan Figge, Gregor Schrott, Jan Muntermann, Kai ...
Java Remote Method Invocation (RMI) is a specification for building distributed object-oriented applications. RMI was designed primarily for use in conventional, wired computing e...
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
Abstract. Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must ...
Mathias Humbert, Mohammad Hossein Manshaei, Julien...