Sciweavers

304 search results - page 34 / 61
» Trusted Computing in Mobile Action
Sort
View
TRUST
2010
Springer
14 years 22 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
PEWASUN
2004
ACM
14 years 1 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
WMCSA
2003
IEEE
14 years 28 days ago
Pervasive Information Acquisition for Mobile AR-Navigation Systems
Today car-navigation systems are increasingly penetrating the automotive market. However, the need for location-based information systems is no longer limited to cars. Mobile outd...
Wolfgang Narzt, Gustav Pomberger, Alois Ferscha, D...
CHI
2007
ACM
14 years 8 months ago
Comedia: mobile group media for active spectatorship
Previous attempts to support spectators at large-scale events have concentrated separately on real-time event information, awareness cues, or media-sharing applications. CoMedia c...
Giulio Jacucci, Antti Oulasvirta, Tommi Ilmonen, J...