Sciweavers

1331 search results - page 4 / 267
» Trusted Mobile Platforms
Sort
View
JUCS
2010
124views more  JUCS 2010»
13 years 5 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
AINA
2009
IEEE
14 years 2 months ago
A Property Based Framework for Trust and Reputation in Mobile Computing
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based ...
Kevin Jones, Helge Janicke, Antonio Cau
MOBISEC
2009
Springer
14 years 2 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
14 years 1 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...