Sciweavers

7 search results - page 1 / 2
» icsnc 2006
Sort
View
ICSNC
2006
IEEE
14 years 4 months ago
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol
Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kub...
ICSNC
2006
IEEE
14 years 4 months ago
XHTML encoding and compression
The wireless markup language (WML), used in WAP, is based on XML and therefore is quite verbose. Mobile devices do not typically have the processing power or memory to process such...
Sathiamoorthy Manoharan
ICSNC
2006
IEEE
14 years 4 months ago
Security Issues in Wireless Sensor Networks
– Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive documen...
Tanveer Zia, Albert Y. Zomaya
ICSNC
2006
IEEE
14 years 4 months ago
Privacy-Invasive Software and Preventive Mechanisms
Computers are increasingly more integrated into peoples’ daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometime...
Martin Boldt, Bengt Carlsson
ICSNC
2006
IEEE
14 years 4 months ago
Middleware - An Effort towards Making Mobile Applications Platform Independent
We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using ...
Neeraj Gupta, Vishal Srivastav, M. P. S. Bhatia