Sciweavers

1331 search results - page 74 / 267
» Trusted Mobile Platforms
Sort
View
JUCS
2006
86views more  JUCS 2006»
13 years 9 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
SUTC
2006
IEEE
14 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
IROS
2008
IEEE
181views Robotics» more  IROS 2008»
14 years 4 months ago
Scalable Bayesian human-robot cooperation in mobile sensor networks
— In this paper, scalable collaborative human-robot systems for information gathering applications are approached as a decentralized Bayesian sensor network problem. Humancompute...
Frédéric Bourgault, Aakash Chokshi, ...
ACSAC
2005
IEEE
14 years 3 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
ICDCSW
2003
IEEE
14 years 2 months ago
ContextCube - Providing Context Information Ubiquitously
Sensing the state of the environment is an important source for context-aware applications. Several approaches exist to provide sensor information to mobile application nodes. As ...
Martin Bauer, Christian Becker, Jörg Häh...