Sciweavers

1226 search results - page 107 / 246
» Secure Mobile Gambling
Sort
View
JNW
2007
80views more  JNW 2007»
15 years 3 months ago
Providing Security Services in a Resource Discovery System
— Nowadays, portable electronic devices allow users to access available resources wherever they are. In this sense, announcement and discovering of services and resources are two...
Juan Vera del Campo, Josep Pegueroles, Miguel Sori...
SISW
2005
IEEE
15 years 9 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
CROSSROADS
2004
108views more  CROSSROADS 2004»
15 years 3 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
ICDCSW
2003
IEEE
15 years 9 months ago
Controlled Availability of Pervasive Web Services
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
Peter Robinson, Stefan Hild
ENTCS
2008
94views more  ENTCS 2008»
15 years 3 months ago
Monitoring External Resources in Java MIDP
We present a Java library for mobile phones which tracks and controls at runtime the use of potentially costly resources, such as premium rate text messages. This improves on the ...
David Aspinall, Patrick Maier, Ian Stark