Sciweavers

947 search results - page 36 / 190
» Information Security in Mobile Databases
Sort
View
111
Voted
PERVASIVE
2006
Springer
15 years 3 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
134
Voted
EDBT
2008
ACM
161views Database» more  EDBT 2008»
16 years 3 months ago
The TELAR mobile mashup platform for Nokia internet tablets
With the Web 2.0 trend and its participation of end-users more and more data and information services are online accessible, such as web sites, Wikis, or web services. The integra...
Andreas Brodt, Daniela Nicklas
DEXAW
2004
IEEE
105views Database» more  DEXAW 2004»
15 years 7 months ago
C2P2: A Peer-to-Peer Network for On-Demand Automobile Information Services
This short paper outlines challenges of delivering continuous media and traffic information to mobile Car-to-Car Peer-to-Peer (C2P2) network of devices. We analyze network connect...
Shahram Ghandeharizadeh, Bhaskar Krishnamachari
WISTP
2007
Springer
15 years 9 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
119
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...