Sciweavers

1331 search results - page 110 / 267
» Trusted Mobile Platforms
Sort
View
118
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Decompression Method for Massive Compressed Files in Mobile Rich Media Applications
Aiming at the characteristics of mobile terminal equipments, the program of decompressing massive compressed files in mobile rich media applications is investigated in this paper....
Houchen Li, Zhijie Qiu, Lei Luo
103
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Secure 3G User Authentication in Adhoc Serving Networks
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a pr...
Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard...
136
Voted
NSDI
2008
15 years 6 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
100
Voted
ICDCSW
2003
IEEE
15 years 9 months ago
A Scalable Hash-Based Mobile Agent Location Mechanism
In this paper, we propose a novel mobile agent tracking mechanism based on hashing. To allow our system to adapt to variable workloads, dynamic rehashing is supported. The propose...
Georgia Kastidou, Evaggelia Pitoura, George Samara...
147
Voted
ESAS
2007
Springer
15 years 9 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...