Sciweavers

6781 search results - page 190 / 1357
» Processors for Mobile Applications
Sort
View
QSIC
2006
IEEE
14 years 4 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
ASPDAC
2006
ACM
123views Hardware» more  ASPDAC 2006»
14 years 4 months ago
Implementation of H.264/AVC decoder for mobile video applications
- This paper presents an H.264/AVC baseline profile decoder based on a SoC platform design methodology. The overall decoding throughput is increased by optimized software and a ded...
Suh Ho Lee, Ji Hwan Park, Seon Wook Kim, Sung Jea ...
MSWIM
2005
ACM
14 years 4 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
PERVASIVE
2005
Springer
14 years 3 months ago
Context Modeling for Device- and Location-Aware Mobile Web Applications
Ubiquitous Web systems have to deal with varying context information in order to support context awareness. Accomplishing this requirement necessitates gathering, processing and r...
Michael Hinz, Zoltán Fiala
FC
2008
Springer
134views Cryptology» more  FC 2008»
14 years 5 days ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate