Sciweavers

1462 search results - page 33 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
PERCOM
2004
ACM
14 years 8 months ago
A Middleware for Supporting Disconnections and Multi-Network Access in Mobile Environments
The middleware infrastructure to support applications is becoming critically important to the new horizons of mobile and pervasive computing. In this context, the goal of our work...
Mejdi Kaddour, Laurent Pautet
SAC
2011
ACM
12 years 11 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
WMASH
2004
ACM
14 years 1 months ago
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
ISJGP
2007
146views more  ISJGP 2007»
13 years 8 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
14 years 3 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli