Sciweavers

722 search results - page 23 / 145
» Offering Mobile Security as a Service
Sort
View
SUTC
2010
IEEE
13 years 5 months ago
UbiMASS
—Ubiquitous systems build on the vision that great amounts of fixed and mobile microchips and sensors will be integrated in everyday objects. Developing services on basis of sen...
Faruk Bagci, Julian Wolf, Benjamin Satzger, Theo U...
CSREASAM
2010
13 years 5 months ago
Geotagging Where Cyberspace Comes to Your Place
- The combination of GPS services and information technology is increasing with the use of geotagging now occurring as a default action in many commodity based devices functionalit...
Craig Valli, Peter Hannay
CN
2000
72views more  CN 2000»
13 years 7 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
AINA
2009
IEEE
14 years 15 days ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
IASTEDSE
2004
13 years 8 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...