Sciweavers

722 search results - page 26 / 145
» Offering Mobile Security as a Service
Sort
View
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 1 months ago
Service Roaming over Mobile Networks: A Reality Check
—Today, international mobile roaming (IMR) is experiencing changes both in terms of technology and business models. Traditionally, voice and SMS have been the only services offer...
K. R. Renjish Kumar
CCS
2009
ACM
13 years 11 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
CCS
2010
ACM
13 years 4 months ago
Secure encounter-based social networks: requirements, challenges, and designs
In this paper we outline requirements, challenges, and designs for encounter-based mobile social networks, where relationships are based on a temporarily shared location. To illus...
Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schu...
COOPIS
2002
IEEE
14 years 11 days ago
On Real-Time Top k Querying for Mobile Services
Mobile services offering multi-feature query capabilities must meet tough response time requirements to gain customer acceptance. The top-k query model is a popular candidate to im...
Wolf-Tilo Balke, Ulrich Güntzer, Werner Kie&s...
ACSW
2007
13 years 8 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung