Sciweavers

1226 search results - page 5 / 246
» Secure Mobile Gambling
Sort
View
JNCA
2010
85views more  JNCA 2010»
13 years 1 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
JNIT
2010
98views more  JNIT 2010»
13 years 1 months ago
An Architectural Design for Secure Mobile Remote Macro-Payments
S. Britto R. Kumar, S. Albert Rabara
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
12 years 2 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
SIGCOMM
2012
ACM
11 years 9 months ago
First insights from a mobile honeypot
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Matthias Wählisch, Sebastian Trapp, Christian...
ICIW
2007
IEEE
14 years 1 months ago
Towards Secure Mobile P2P Systems
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additiona...
James Walkerdine, Simon Lock