Sciweavers

52 search results - page 3 / 11
» Improving the Security of Mobile-Phone Access to Remote Pers...
Sort
View
CCS
2004
ACM
13 years 11 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 3 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
MOBISYS
2008
ACM
14 years 5 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
FC
2007
Springer
117views Cryptology» more  FC 2007»
13 years 12 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
GLOBECOM
2008
IEEE
13 years 6 months ago
Mobile Solution for Three-Tier Biofeedback Data Acquisition and Processing
— Wireless sensor networks span from military applications into everyday life. Body sensor networks greatly benefit from wireless sensor networks to answer the biofeedback challe...
Orlando R. E. Pereira, Paulo A. C. S. Neves, Joel ...