Sciweavers

50 search results - page 9 / 10
» A Unified Framework for Mobile Device Security
Sort
View
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 5 months ago
Fundamental Limits of Wideband Localization - Part II: Cooperative Networks
The availability of positional information is of great importance in many commercial, governmental, and military applications. Localization is commonly accomplished through the use...
Yuan Shen, Henk Wymeersch, Moe Z. Win
IDTRUST
2010
ACM
13 years 3 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
IADIS
2004
13 years 6 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu
MOBISYS
2008
ACM
14 years 4 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
SACMAT
2009
ACM
13 years 11 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger