Sciweavers

1462 search results - page 16 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
SECURWARE
2008
IEEE
14 years 1 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
IACR
2011
292views more  IACR 2011»
12 years 6 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
WWW
2006
ACM
14 years 7 months ago
Web based device independent mobile map applications.: the m-CHARTIS system
A map is one of the most useful media in disseminating spatial information. As mobile devices are becoming increasingly powerful and ubiquitous, new possibilities to access map in...
John D. Garofalakis, Michail Theofanis-Aristofanis...
COOPIS
2000
IEEE
13 years 11 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
ISCIS
2005
Springer
14 years 7 days ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan