Sciweavers

1856 search results - page 253 / 372
» Phoning it in
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
ACSAC
2006
IEEE
14 years 3 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
GLOBECOM
2006
IEEE
14 years 3 months ago
A New Framework for Indicating Terminal Capabilities in the IP Multimedia Subsystem
The standardization of the IMS as a multi-access network implies that it can be accessed by different classes of terminals. Even at the heart of the same class of terminals (mobile...
Bassam El Saghir, Noël Crespi
IAT
2006
IEEE
14 years 3 months ago
Mobile Agent Architecture Integration for a Wireless Sensor Medical Application
Wireless sensor nodes are used to monitor patient vital signs in a medical application. To ensure proper patient care is provided, real-time patient data must be managed correctly...
John Herbert, John O'Donoghue, Gao Ling, Kai Fei, ...
ICAT
2006
IEEE
14 years 3 months ago
Air-Jet Button Effects in AR
Providing haptic cues can generate increased levels of presence in users as they interact with tangible objects. In this paper, we present button effects delivered by air-jet displ...
Yeongmi Kim, Sehun Kim, Taejin Ha, Ian Oakley, Woo...