Sciweavers

745 search results - page 97 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
JUCS
2008
149views more  JUCS 2008»
13 years 8 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
NETWORK
2008
100views more  NETWORK 2008»
13 years 8 months ago
Distributed connectivity service for a SIP infrastructure
Because of the constant reduction of available public network addresses and the necessity to secure networks, devices like Network Address Translators and firewalls have become qui...
Luigi Ciminiera, Guido Marchetto, Fulvio Risso, Li...
CSREAPSC
2006
13 years 10 months ago
Modelling Application Handovers For Thin-Client Mobility
Mobile users need lightweight devices with low energy consumption. When applications are executed on remote servers instead of locally on the end-user's device, the weight of...
Pieter Simoens, Lien Deboosere, Davy De Winter, Fi...
ACSC
2007
IEEE
14 years 3 months ago
Architecture of a Web Accelerator For Wireless Networks
With the continuous growth of mobile users and web-based wireless applications, the performance of accessing web services via wireless is becoming one of the key issues. Regular T...
Jian Song, Yanchun Zhang
SOUPS
2010
ACM
14 years 21 days ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell