Sciweavers

722 search results - page 132 / 145
» Offering Mobile Security as a Service
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 8 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
JUCS
2010
124views more  JUCS 2010»
13 years 5 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
DOCENG
2006
ACM
14 years 1 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
INFOCOM
2003
IEEE
14 years 20 days ago
Uplink Scheduling in CDMA Packet-Data Systems
Abstract—Uplink scheduling in wireless systems is gaining importance due to arising uplink intensive data services (ftp, image uploads etc.), which could be hampered by the curre...
Krishnan Kumaran, Lijun Qian
MIS
2008
Springer
191views Multimedia» more  MIS 2008»
13 years 7 months ago
QoS management and control for an all-IP WiMAX network architecture: Design, implementation and evaluation
The IEEE 802.16 standard provides a specification for a fixed and mobile broadband wireless access system, offering high data rate transmission of multimedia services with differen...
Thomas Michael Bohnert, Marco Castrucci, Nicola Ci...