Sciweavers

615 search results - page 1 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
13 years 11 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
13 years 10 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
13 years 10 months ago
Security Analysis of Mobile Java
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
JIPS
2011
62views more  JIPS 2011»
12 years 11 months ago
Security Framework for RFID-based Applications in Smart Home Environment
Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun, ...