Sciweavers

75 search results - page 2 / 15
» Overcoming the challenge of security in a mobile environment
Sort
View
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 10 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
JDCTA
2010
125views more  JDCTA 2010»
13 years 5 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
VOTEID
2007
Springer
14 years 5 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
WETICE
2003
IEEE
14 years 4 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell
GLOBECOM
2010
IEEE
13 years 8 months ago
Distributed High Accuracy Peer-to-Peer Localization in Mobile Multipath Environments
In this paper we consider the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. We employ a peer to pee...
Venkatesan N. Ekambaram, Kannan Ramchandran