Sciweavers

589 search results - page 24 / 118
» Evaluating mobile phones as risk information providers
Sort
View
CCS
2009
ACM
14 years 9 months ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart
ACMDIS
2008
ACM
13 years 10 months ago
TapGlance: designing a unified smartphone interface
The difference between using one mobile phone and another can feel like learning a new language based on our extensive experience designing mobile applications for spatial data na...
Daniel C. Robbins, Bongshin Lee, Roland Fernandez
CSIE
2009
IEEE
14 years 3 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
MSWIM
2009
ACM
14 years 3 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
MDM
2005
Springer
170views Communications» more  MDM 2005»
14 years 2 months ago
The role of caching and context-awareness in P2P service discovery
Mobile terminals (cellular phones, PDAs, palmtops etc.) emerge as a new class of small-scale, ad-hoc service providers that share data and functionality via mobile web services’...
Christos Doulkeridis, Vassilis Zafeiris, Michalis ...