Sciweavers

2808 search results - page 536 / 562
» Mobile Agent Security
Sort
View
APLAS
2008
ACM
13 years 12 months ago
JavaScript Instrumentation in Practice
JavaScript has been exploited to launch various browser-based attacks. Our previous work proposed a theoretical framework applying policy-based code instrumentation to JavaScript. ...
Haruka Kikuchi, Dachuan Yu, Ajay Chander, Hiroshi ...
DLS
2005
101views Languages» more  DLS 2005»
13 years 11 months ago
Flexible object encapsulation for ambient-oriented programming
In the emerging field of Ambient Intelligence (AmI), software is deployed in wireless open networks of mobile devices. Such open networks require stringent security measures as u...
Wolfgang De Meuter, Éric Tanter, Stijn Most...
HCI
2007
13 years 11 months ago
A Cross Culture Study on Phone Carrying and Physical Personalization
The mobile phone has become one of the essential objects that people carry when they leave home. By conducting a series of street interviews in 11 cities on 4 continents, we attemp...
Yanqing Cui, Jan Chipchase, Fumiko Ichikawa
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 11 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 11 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...