Sciweavers

1462 search results - page 7 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
WETICE
2006
IEEE
14 years 21 days ago
Handling Exceptional Conditions in Mobile Collaborative Applications: An Exploratory Case Study
The incorporation of exception handling strategies in mobile collaborative applications bring several challenges to middleware designers due to their intrinsic characteristics of ...
Nélio Cacho, Karla Damasceno, Alessandro Ga...
EEE
2004
IEEE
13 years 10 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar
PERCOM
2011
ACM
13 years 1 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
CN
2007
172views more  CN 2007»
13 years 6 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ACSAC
2000
IEEE
13 years 11 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...