Sciweavers

125 search results - page 11 / 25
» Data security in mobile devices by geo locking
Sort
View
IASTEDSE
2004
13 years 8 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...
ICPPW
2005
IEEE
14 years 1 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
SAC
2011
ACM
12 years 10 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
NORDSEC
2009
Springer
14 years 1 months ago
Towards True Random Number Generation in Mobile Environments
In our paper, we analyze possibilities to generate true random data in mobile devices such as mobile phones or pocket computers. We show how to extract arguably true random data w...
Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svend...
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 8 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä