Sciweavers

1462 search results - page 34 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
DEXAW
2007
IEEE
150views Database» more  DEXAW 2007»
14 years 4 months ago
Compressed Aggregations for mobile OLAP Dissemination
As wireless network infrastructure becomes more reliable, an increasing number of traditional desktop applications, beyond common web browsing, migrate to portable devices. Since ...
Ilias Michalarias, Arkadiy Omelchenko
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
14 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
CCS
2006
ACM
14 years 1 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
IWSEC
2010
Springer
13 years 8 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
CNIS
2006
13 years 11 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman