Sciweavers

947 search results - page 45 / 190
» Information Security in Mobile Databases
Sort
View
143
Voted
JSS
2008
97views more  JSS 2008»
15 years 3 months ago
XML security - A comparative literature review
Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML S...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Mark...
154
Voted
DBKDA
2009
IEEE
238views Database» more  DBKDA 2009»
15 years 6 months ago
MyMIDP: An JDBC Driver for Accessing MySQL from Mobile Devices
Cell phones are no longer merely used to make phone calls or to send short or multimedia messages. They more and more become information systems clients. Recent developments in th...
Hagen Höpfner, Jörg Schad, Sebastian Wen...
123
Voted
ESORICS
2008
Springer
15 years 5 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
130
Voted
MATA
2004
Springer
113views Communications» more  MATA 2004»
15 years 9 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
IEEEIAS
2008
IEEE
15 years 10 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell