Sciweavers

761 search results - page 76 / 153
» Security Aspects of Mobile Communications
Sort
View
CSFW
2007
IEEE
14 years 3 months ago
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
Heiko Mantel, Henning Sudbrock
WMTE
2005
IEEE
14 years 2 months ago
Lifeblog: A New Concept in Mobile Learning?
In this paper we report early findings from a sample of Australian participants using Nokia’s Lifeblog software on mobile phones to record aspects of living and learning in both...
Elizabeth Hartnell-Young, Frank Vetere
PERCOM
2010
ACM
14 years 26 days ago
Decomposing power measurements for mobile devices
—Modern mobile phones are an appealing platform for pervasive computing applications. However, the complexity of these devices makes it difficult for developers to understand th...
Andrew Colin Rice, Simon Hay
IJWBC
2007
99views more  IJWBC 2007»
13 years 8 months ago
Exploring mobile information systems for chronically ill adolescent patients
: Adolescent cancer patients have to deal with many dependencies and obligations. Very often they are torn out of their social environment and become isolated because of changing t...
Jan Marco Leimeister, Uta Franziska Knebel, Helmut...
ACSAC
2006
IEEE
14 years 3 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz