Sciweavers

1331 search results - page 34 / 267
» Trusted Mobile Platforms
Sort
View
ETRICS
2006
13 years 11 months ago
Transitive Trust in Mobile Scenarios
rorizontl integrtion of ess tehnologies to networks nd servies should e ompnied y some kind of onvergene of uthentiE tion tehnologiesF he missing link for the federtion of user ide...
Nicolai Kuntze, Andreas U. Schmidt
COMCOM
2007
83views more  COMCOM 2007»
13 years 7 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
MATA
2000
Springer
104views Communications» more  MATA 2000»
13 years 11 months ago
Modeling an OMG-MASIF Compliant Mobile Agent Platform with the RM-ODP Engineering Language
In order to model telecommunications services as mobile agent system, we are defining a methodology based on the RM-ODP standards. Our approach makes the distinction between the se...
Florin Muscutariu, Marie-Pierre Gervais
ACSAC
2004
IEEE
13 years 11 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...