In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
With the current proliferation of wireless networks and mobile device technologies, the management of moving object databases to facilitate queries over these domains has been exte...
High-end mobile phones are quickly becoming versatile sensing platforms, capable of continuously capturing the dynamic context of their owners through various sensors. A change in...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...