Sciweavers

1331 search results - page 100 / 267
» Trusted Mobile Platforms
Sort
View
120
Voted
SIGKDD
2010
159views more  SIGKDD 2010»
15 years 1 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....
CSIE
2009
IEEE
15 years 10 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
136
Voted
EUSAI
2003
Springer
15 years 8 months ago
Ubiquitous Attentiveness - Enabling Context-Aware Mobile Applications and Services
Abstract. We present a concept called ‘ubiquitous attentiveness’: Context information concerning the user and his environment is aggregated, exchanged and constitutes triggers ...
Herma Van Kranenburg, Alfons H. Salden, Henk Eerti...
SEUS
2005
IEEE
15 years 9 months ago
A Strategy for Application-Transparent Integration of Nomadic Computing Domains
Nomadic computing environments are composed of heterogeneous mobile computing domains. Unfortunately, the service discovery platforms suitable for each domain are scarcely interop...
Domenico Cotroneo, Cristiano di Flora, Massimo Fic...
145
Voted
CCS
2004
ACM
15 years 9 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen