Sciweavers

313 search results - page 2 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
CSI
2004
353views more  CSI 2004»
13 years 5 months ago
Design and implementation of a mobile database for Java phones
Due to the popularity of electronic commerce and the maturity of wireless technology, mobile users can access the Internet anytime anywhere without having to physically hook up an...
Eric Jui-Lin Lu, Yung-Yuan Cheng
CCS
2007
ACM
13 years 11 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
AINA
2005
IEEE
13 years 10 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
ACSAC
2005
IEEE
13 years 10 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
SAC
2002
ACM
13 years 4 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...