Sciweavers

589 search results - page 73 / 118
» Evaluating mobile phones as risk information providers
Sort
View
ISW
2009
Springer
14 years 3 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
ICDE
2009
IEEE
136views Database» more  ICDE 2009»
14 years 10 months ago
A Concise Representation of Range Queries
Abstract--With the advance of wireless communication technology, it is quite common for people to view maps or get related services from the handheld devices, such as mobile phones...
Ke Yi, Xiang Lian, Feifei Li, Lei Chen 0002
ICDCSW
2003
IEEE
14 years 2 months ago
Entry Points into a Smart Campus Environment - Overview of the ETHOC System
The university campus is an interesting application environment for the ubiquitous computing paradigm: a large number of users share a substantial amount of their information need...
Michael Rohs, Jürgen Bohn
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
14 years 2 months ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell
TRIDENTCOM
2005
IEEE
14 years 2 months ago
Analysis and Experimentation over Heterogeneous Wireless Networks
Wireless and mobile networks represent an enabling technology for ubiquitous access to information systems. However, there are critical issues that still prevent the widespread us...
Massimo Bernaschi, Antonio Pescapè, Filippo...