Sciweavers

745 search results - page 90 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
CARDIS
2006
Springer
101views Hardware» more  CARDIS 2006»
14 years 16 days ago
Smartcard Firewalls Revisited
Smartcards are being used as secure endpoints in computer transactions. Recently, the connectivity of smartcards has increased and future smartcards will be able to communicate ove...
Henrich Christopher Pöhls, Joachim Posegga
IDC
2009
Springer
13 years 6 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
SACMAT
2009
ACM
14 years 3 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
HUC
2000
Springer
14 years 12 days ago
Event-Driven, Personalizable, Mobile Interactive Spaces
Abstract An infrastructure is currently being deployed for delivering multimedia services using IP endto-end. Mobile devices and application resources, because of their computing c...
Theo Kanter
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 3 months ago
A Session-Initiation-Protocol-Based Middleware for Multi-Application Management
Abstract—The deployment of multimedia services in nextgeneration networks is a challenge due to the high configuration complexity of the streaming process in different stationary...
Teodora Guenkova-Luy, Holger Schmidt, Andreas Scho...