Sciweavers

75 search results - page 3 / 15
» Overcoming the challenge of security in a mobile environment
Sort
View
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
14 years 5 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
ISJGP
2007
146views more  ISJGP 2007»
13 years 10 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
ACSAC
2001
IEEE
14 years 2 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
ISW
2004
Springer
14 years 4 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
MUE
2007
IEEE
116views Multimedia» more  MUE 2007»
14 years 5 months ago
Towards High Quality Mobile Services for Senior Citizens in Smart Living Environments
The aging of our society presents a range of challenges to housing providers. With the advanced mobile technologies we are now able to develop quality mobile services to help seni...
Xiaosong Zheng, Petri Pulli