Sciweavers

240 search results - page 10 / 48
» Security Modeling and Evaluation for the Mobile Code Paradig...
Sort
View
DEXAW
1998
IEEE
109views Database» more  DEXAW 1998»
13 years 11 months ago
Expressing Dynamics of Mobile Agent Systems Using Ambient Calculus
The mobile agent approach has become popular due to recent developments in the mobile code paradigm and enabling programming technologies. Many existing agentbased systems lack cl...
Peter Stañski, Arkady B. Zaslavsky
ISSRE
2003
IEEE
14 years 22 days ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 8 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
JNW
2008
177views more  JNW 2008»
13 years 7 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...