Sciweavers

947 search results - page 82 / 190
» Information Security in Mobile Databases
Sort
View
NIPS
2001
15 years 5 months ago
Optimising Synchronisation Times for Mobile Devices
With the increasing number of users of mobile computing devices (e.g. personal digital assistants) and the advent of third generation mobile phones, wireless communications are be...
Neil D. Lawrence, Antony I. T. Rowstron, Christoph...
137
Voted
CIKM
2008
Springer
15 years 4 months ago
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
Xiao Pan, Jianliang Xu, Xiaofeng Meng
ITCC
2005
IEEE
15 years 9 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
156
Voted
TIFS
2010
130views more  TIFS 2010»
14 years 10 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
131
Voted
SSD
2001
Springer
145views Database» more  SSD 2001»
15 years 8 months ago
Continuous Queries within an Architecture for Querying XML-Represented Moving Objects
The development of spatiotemporal database systems is primarily motivated by applications tracking and presenting mobile objects. Another important trend is the visualization and p...
Thomas Brinkhoff, Jürgen Weitkämper