Sciweavers

1081 search results - page 95 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
14 years 2 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
ACSAC
2001
IEEE
14 years 15 days ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
NCA
2007
IEEE
14 years 3 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...
LICS
2000
IEEE
14 years 1 months ago
Models for Name-Passing Processes: Interleaving and Causal
We study syntax-free models for name-passing processes. For interleaving semantics, we identify the indexing structure required of an early labelled transition system to support t...
Gian Luca Cattani, Peter Sewell
WISE
2008
Springer
14 years 3 months ago
Mobile Payment: Towards a Customer-Centric Model
Abstract. Mobile payment normally occurs as a wireless transaction of monetary value and includes the initiation, authorization and the realization of the payment. Such transaction...
Krassie Petrova