Sciweavers

1462 search results - page 12 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
MSWIM
2005
ACM
14 years 8 days ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
ESORICS
2008
Springer
13 years 8 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
12 years 2 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
SAC
2000
ACM
13 years 11 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
CHI
2008
ACM
14 years 7 months ago
Blindsight: eyes-free access to mobile phones
Many mobile phones integrate services such as personal calendars. Given the social nature of the stored data, however, users often need to access such information as part of a pho...
Kevin A. Li, Patrick Baudisch, Ken Hinckley