Sciweavers

135 search results - page 11 / 27
» Secure Mobile Computing Via Public Terminals
Sort
View
SAC
2002
ACM
13 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ISICT
2003
13 years 11 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
MHCI
2004
Springer
14 years 3 months ago
Comparison of Mobile and Fixed Use of SmartLibrary
Abstract. Finding books in large libraries can be difficult for novice library users. This paper presents the current status of SmartLibrary, a web-based guidance application helpi...
Markus Aittola, Pekka Parhi, Maria Vieruaho, Timo ...
ENGL
2007
78views more  ENGL 2007»
13 years 9 months ago
A Method for Secure Query Processing in Mobile Databases
—A method for secure query processing in mobile databases has been presented in this paper. Mobile devices send queries to the server via point-to-point channels. The mobile data...
D. Saha, N. Chowdhury
WISTP
2007
Springer
14 years 3 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz