Sciweavers

13 search results - page 1 / 3
» Malicious Code Moves to Mobile Devices
Sort
View
COMPUTER
2000
65views more  COMPUTER 2000»
13 years 4 months ago
Malicious Code Moves to Mobile Devices
Neal Leavitt
WMCSA
2008
IEEE
13 years 11 months ago
Screen codes: visual hyperlinks for displays
We present ‘Screen codes’ - a space- and time-efficient, aesthetically compelling method for transferring data from a display to a camera-equipped mobile device. Screen codes ...
John P. Collomosse, Tim Kindberg
ISCAPDCS
2004
13 years 6 months ago
Location Based Access to Moving Data Sources
Location based services in mobile environments have been recognized as a challenging problem that calls for new service models and dynamic strategies. The problem becomes even har...
Shiow-yang Wu, Wei-chung Ko
MOBICOM
1996
ACM
13 years 9 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
CCS
2007
ACM
13 years 11 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...