Sciweavers

947 search results - page 31 / 190
» Information Security in Mobile Databases
Sort
View
MHCI
2009
Springer
15 years 10 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
124
Voted
VLDB
1999
ACM
96views Database» more  VLDB 1999»
15 years 7 months ago
A Scalable and Highly Available Networked Database Architecture
The explosive growth of the Internet and information devices has driven database systems to be more scaleable, available, and able to support online, mobile, and disconnected clie...
Roger Bamford, Rafiul Ahad, Angelo Pruscino
150
Voted
COMPSEC
2008
138views more  COMPSEC 2008»
15 years 3 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
15 years 1 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
102
Voted
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 3 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav