Sciweavers

201 search results - page 2 / 41
» Information security in networkable Windows-based operating ...
Sort
View
SIGOPSE
2000
ACM
14 years 1 months ago
The data management problem in post-pc devices and a solution
The demand for network-enabled limited-footprint mobile devices is increasing rapidly. A central challenge that must be addressed in order to use these next-generation devices eff...
Ramakrishna Gummadi, Randy H. Katz
SAC
2009
ACM
14 years 1 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
ICEB
2004
297views Business» more  ICEB 2004»
13 years 10 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob
SOUPS
2010
ACM
14 years 1 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
IEEESP
2006
130views more  IEEESP 2006»
13 years 9 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...