Sciweavers

135 search results - page 7 / 27
» Secure Mobile Computing Via Public Terminals
Sort
View
MOBISYS
2009
ACM
14 years 10 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
GPC
2008
Springer
13 years 11 months ago
Layered Peer-to-Peer Architecture for Mobile Web Services via Converged Cellular and Ad Hoc Networks
Mobile communication technology is rapidly developed with the enhanced networking capacities as well as the expanding population of mobile subscribers. Providing Web services via ...
Zhonghong Ou, Meina Song, Hui Chen, Junde Song
ESORICS
1994
Springer
14 years 1 months ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson
ACMACE
2010
ACM
13 years 4 months ago
Tangible anchoring: grasping news and public opinion
Tangible Anchoring explores potential practices for news reporting and analysis afforded by the convergence of tabletop computing forms, broadcast media, and user-generated conten...
Susan J. Robinson, Sam Mendenhall, Vedrana Novosel...
CCS
2010
ACM
13 years 10 months ago
Efficient sensor node authentication via 3GPP mobile communication networks
Energy efficiency is one of important issues in the resource contrained wireless sensor network. In this paper, we propose the authentication and key agreement protocol that effic...
Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Sh...