Sciweavers

235 search results - page 19 / 47
» Using Mobile Phones for Monitoring Physical Conditions
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 8 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
NBIS
2009
Springer
14 years 1 months ago
Analysis of Web Alert Models
act— Web alerts are user-defined monitor conditions for public Internet information in which notification messages are sent to users whenever their alert conditions are met. The ...
Jameela Al-Jaroodi, Nader Mohamed
SAC
2011
ACM
12 years 11 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
ACSAC
2010
IEEE
13 years 6 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
USAB
2008
13 years 10 months ago
Instruction Formats and Navigation Aids in Mobile Devices
Three different instruction formats were examined respecting their usefulness for the navigation through hierarchical menus in mobile phones. 56 middle-aged adults had to solve fou...
Martina Ziefle