Sciweavers

1856 search results - page 297 / 372
» Phoning it in
Sort
View
COMCOM
2008
153views more  COMCOM 2008»
13 years 9 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...
COMPSEC
2008
138views more  COMPSEC 2008»
13 years 9 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
COMPUTER
2006
90views more  COMPUTER 2006»
13 years 9 months ago
Visualizing Information on Mobile Devices
Visualization has a relevant role in almost every domain of computer applications. It is thus natural to think about bringing visualization techniques to mobile devices (such as P...
Luca Chittaro
ENTCS
2006
109views more  ENTCS 2006»
13 years 9 months ago
An Overview of MANETs Simulation
Mobile Ad hoc NETworks (MANETs) are dynamic networks populated by mobile stations. Stations in MANETs are usually laptops, PDAs or mobile phones. These devices feature Bluetooth a...
Luc Hogie, Pascal Bouvry, Frédéric G...
EOR
2006
104views more  EOR 2006»
13 years 9 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke