Sciweavers

947 search results - page 117 / 190
» Information Security in Mobile Databases
Sort
View
117
Voted
CCS
2009
ACM
15 years 10 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
CIA
1999
Springer
15 years 7 months ago
Mobile-Agent Mediated Place Oriented Communication
When we communicate with others in a most primitive way like face-to-face conversation, we normally gather at a common physical place. This physical constraint has been recognized ...
Yasuhiko Kitamura, Yasuhiro Mawarimichi, Shoji Tat...
TC
2008
15 years 3 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
146
Voted
AHSWN
2006
206views more  AHSWN 2006»
15 years 3 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
ISI
2003
Springer
15 years 8 months ago
PROGENIE: Biographical Descriptions for Intelligence Analysis
Intelligence analysts face the need for immediate, up-to-date information about individuals of interest. While biographies can be written and stored in text databases, we argue tha...
Pablo Ariel Duboué, Kathleen McKeown, Vasil...