Sciweavers

56 search results - page 2 / 12
» Software security aspects of Java-based mobile phones
Sort
View
CASSIS
2004
Springer
13 years 10 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
JDCTA
2010
125views more  JDCTA 2010»
13 years 4 days ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
DIM
2007
ACM
13 years 9 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
IACR
2011
292views more  IACR 2011»
12 years 5 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
WMTE
2005
IEEE
13 years 11 months ago
Lifeblog: A New Concept in Mobile Learning?
In this paper we report early findings from a sample of Australian participants using Nokia’s Lifeblog software on mobile phones to record aspects of living and learning in both...
Elizabeth Hartnell-Young, Frank Vetere