Sciweavers

17 search results - page 3 / 4
» Defending Mobile Phones from Proximity Malware
Sort
View
ICDE
2010
IEEE
359views Database» more  ICDE 2010»
14 years 9 months ago
Policy-Aware Sender Anonymity in Location Based Services
Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
ACSAC
2006
IEEE
14 years 3 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
AAAI
2011
12 years 9 months ago
Composite Social Network for Predicting Mobile Apps Installation
We have carefully instrumented a large portion of the population living in a university graduate dormitory by giving participants Android smart phones running our sensing software...
Wei Pan, Nadav Aharony, Alex Pentland
CSCW
2011
ACM
13 years 4 months ago
CoupleVIBE: mobile implicit communication to improve awareness for (long-distance) couples
Long-distance couples face considerable communication challenges in their relationships. Unlike collocated couples, long-distance couples lack awareness cues associated with physi...
Elizabeth Bales, Kevin A. Li, William Griwsold
ICTAI
2006
IEEE
14 years 3 months ago
On the Relationships between Clustering and Spatial Co-location Pattern Mining
The goal of spatial co-location pattern mining is to find subsets of spatial features frequently located together in spatial proximity. Example co-location patterns include servi...
Yan Huang, Pusheng Zhang