Sciweavers

304 search results - page 39 / 61
» Trusted Computing in Mobile Action
Sort
View
DOA
2000
87views more  DOA 2000»
13 years 9 months ago
MODE: A Java-like Environment for Experimenting Mobility Policies
The wide acceptance of object-oriented environments and proposals has renewed interest in all the class inheritance related issues; in particular its implementation in distributed...
Giuliano Armano, Antonio Corradi, Letizia Leonardi...
SAINT
2007
IEEE
14 years 1 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
WMCSA
2009
IEEE
14 years 2 months ago
We saw each other on the subway: secure, anonymous proximity-based missed connections
There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to ei...
Justin Manweiler, Ryan Scudellari, Zachary Cancio,...
IEEEIAS
2008
IEEE
14 years 2 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
WIMOB
2008
IEEE
14 years 2 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg