Sciweavers

1226 search results - page 5 / 246
» Secure Mobile Gambling
Sort
View
JNCA
2010
85views more  JNCA 2010»
14 years 10 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
JNIT
2010
98views more  JNIT 2010»
14 years 10 months ago
An Architectural Design for Secure Mobile Remote Macro-Payments
S. Britto R. Kumar, S. Albert Rabara
141
Voted
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
13 years 11 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
120
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
First insights from a mobile honeypot
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Matthias Wählisch, Sebastian Trapp, Christian...
125
Voted
ICIW
2007
IEEE
15 years 9 months ago
Towards Secure Mobile P2P Systems
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additiona...
James Walkerdine, Simon Lock