Sciweavers

1527 search results - page 63 / 306
» A Survey of Web Security
Sort
View
SAC
2002
ACM
14 years 11 months ago
Secure mobile agent systems using Java: where are we heading?
Java is the predominant language for mobile agent systems, both for implementing mobile agent execution environments and for writing mobile agent applications. This is due to inhe...
Walter Binder, Volker Roth
IJIEM
2010
169views more  IJIEM 2010»
14 years 9 months ago
Information security and privacy in healthcare: current state of research
Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation,...
Ajit Appari, M. Eric Johnson
ESORICS
2009
Springer
15 years 6 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
AINA
2007
IEEE
15 years 1 months ago
Secure Mobile Ad hoc Routing
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...
MHCI
2009
Springer
15 years 5 months ago
Mobile phone web browsing: a study on usage and usability of the mobile web
Browsing the Web on mobile phones has finally hit the mass. The visualization of websites on latest mobile phone models comes close to what we are used from desktop computers. Tai...
Grischa Schmiedl, Markus Seidl, Klaus Temper