Sciweavers

1226 search results - page 123 / 246
» Secure Mobile Gambling
Sort
View
HASE
2007
IEEE
15 years 10 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves
HUC
2007
Springer
15 years 10 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
USM
2000
15 years 7 months ago
Trade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scena...
Peer Hasselmeyer, Roger Kehr, Marco Voß
IANDC
2008
140views more  IANDC 2008»
15 years 4 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
SAC
2011
ACM
14 years 6 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez