Sciweavers

206 search results - page 15 / 42
» Remote Code Execution on Ubiquitous Mobile Applications
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
PERCOM
2005
ACM
14 years 7 months ago
A Location Model for Pervasive Computing Environments
This paper presents a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographica...
Ichiro Satoh
ISSRE
2003
IEEE
14 years 25 days ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
ICDCS
2003
IEEE
14 years 25 days ago
Monotonicity and Partial Results Protection for Mobile Agents
Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
Bennet S. Yee
SOSP
1997
ACM
13 years 9 months ago
Agile Application-Aware Adaptation for Mobility
In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach ...
Brian Noble, Mahadev Satyanarayanan, Dushyanth Nar...