Sciweavers

1331 search results - page 116 / 267
» Trusted Mobile Platforms
Sort
View
110
Voted
SECON
2010
IEEE
15 years 1 months ago
Batch Scheduling of Recurrent Applications for Energy Savings on Mobile Phones
Abstract--Recurrent applications that mostly run in the background are a significant source of power consumption on batterylimited mobile phones. We highlight the pitfalls of sched...
Matt Calder, Mahesh K. Marina
131
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
168
Voted
NCA
2003
IEEE
15 years 9 months ago
AdHocFS: Sharing Files in WLANs
This paper presents the ADHOCFS file system for mobile users, which realizes transparent, adaptive file access according to the users’ specific situations (e.g., device in us...
Malika Boulkenafed, Valérie Issarny
125
Voted
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
15 years 8 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
106
Voted
ESORICS
2002
Springer
16 years 3 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith