Sciweavers

1226 search results - page 112 / 246
» Secure Mobile Gambling
Sort
View
SEC
1996
15 years 5 months ago
Location management strategies increasing privacy in mobile communication
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our obj...
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, A...
SP
2002
IEEE
139views Security Privacy» more  SP 2002»
15 years 3 months ago
Mobile objects in Java
Mobile Objects in Java provides support for object mobility in Java. Similarly to the RMI technique, a notion of client-side stub, called startpoint, is used to communicate transp...
Luc Moreau, Daniel Ribbens
NORDSEC
2009
Springer
15 years 10 months ago
Towards True Random Number Generation in Mobile Environments
In our paper, we analyze possibilities to generate true random data in mobile devices such as mobile phones or pocket computers. We show how to extract arguably true random data w...
Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svend...
APSCC
2007
IEEE
15 years 10 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto
VTC
2006
IEEE
179views Communications» more  VTC 2006»
15 years 9 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu