Sciweavers

947 search results - page 20 / 190
» Information Security in Mobile Databases
Sort
View
GI
2005
Springer
15 years 9 months ago
Towards Update Relevance Checks in a Context Aware Mobile Information System
: In order to reduce transmission cost mobile information system clients often cache data retrieved in a context aware manner. In the case of updates it may happen that this data b...
Hagen Höpfner
130
Voted
SPW
2005
Springer
15 years 9 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
ICDIM
2007
IEEE
15 years 9 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
DEXAW
2003
IEEE
128views Database» more  DEXAW 2003»
15 years 8 months ago
Current Mobile Payment Procedures on the German Market from the View of Customer Requirements
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the mos...
Key Pousttchi, Mario Zenker
ACISP
2004
Springer
15 years 9 months ago
Single Database Private Information Retrieval with Logarithmic Communication
In this paper, we study the problem of single database private information retrieval, and present schemes with only logarithmic server-side communication complexity. Previously th...
Yan-Cheng Chang