Sciweavers

947 search results - page 72 / 190
» Information Security in Mobile Databases
Sort
View
156
Voted
FI
2010
175views more  FI 2010»
15 years 1 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
134
Voted
MOBILITY
2009
ACM
15 years 8 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
120
Voted
CAISE
2003
Springer
15 years 9 months ago
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications
Location tracking technologies are penetrating increasingly in industrial environments. Several challenges arise when people or mobile assets are tracked. Security is one of the ma...
Ana Isabel González-Tablas Ferreres, Benjam...
160
Voted
TMC
2011
164views more  TMC 2011»
14 years 10 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
122
Voted
IJCAI
2003
15 years 5 months ago
Integrating Information, Applications and Services on the Web
This is a position paper that describes a long-term ongoing research project that is being developed at ITESM. The project is called Bymx. The aim of Bymx is to integrate informat...
Juan C. Lavariega, Lorena G. Gomez-Martinez