Sciweavers

57 search results - page 5 / 12
» Supporting Digital Signatures in Mobile Environments
Sort
View
WMTE
2005
IEEE
14 years 3 months ago
LOCH: Supporting Informal Language Learning Outside the Classroom with Handhelds
The continuous development of wireless and mobile technologies has allowed the creation of an additional platform for supporting learning, one that can be embedded in the same phy...
Rosa G. J. Paredes, Hiroaki Ogata, A. Nobuji, Yasu...
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 2 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
INDOCRYPT
2001
Springer
14 years 2 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 4 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
CHI
2009
ACM
14 years 1 months ago
Hyperlinking reality via camera phones
Mobile vision services are a type of mobile ITS applications that emerge with increased miniaturization of sensor and computing devices, such as in camera equipped mobile phones, ...
Dusan Omercevic, Ales Leonardis