Sciweavers

219 search results - page 36 / 44
» Security Measures in Mobile Commerce: Problems and Solutions
Sort
View
TMC
2010
386views more  TMC 2010»
13 years 7 months ago
Design, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones
—Mobile phones are truly personal devices loaded with personal data such as photos, contacts, and call history. Yet it is often necessary or desirable to share our phones with ot...
Yunxin Liu, Ahmad Rahmati, Hyukjae Jang, Yuanhe Hu...
ETFA
2008
IEEE
14 years 3 months ago
Exploiting publish/subscribe communication in wireless mesh networks for industrial scenarios
This paper addresses questions of using wireless mesh networks (WMNs) in heterogeneous industrial infrastructures. This implies several problems like global addressing, handling o...
André Herms, Michael Schulze, Jörg Kai...
ICCV
1999
IEEE
14 years 10 months ago
Generalized Bounds for Time to Collision from First-Order Image Motion
This paper addresses the problem of estimating time to collision from local motion eld measurements in the case of unconstrained relative rigid motion and surface orientation. It ...
Carlo Colombo, Alberto Del Bimbo
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
14 years 2 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
DOCENG
2006
ACM
14 years 2 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...