Sciweavers

236 search results - page 33 / 48
» Analyzing Privacy Designs of Mobile Social Networking Applic...
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
15 years 3 months ago
KnowFlow - A Hybrid Approach to Identifying and Visualizing Distributed Knowledge Work Practices
Understanding collaborative work practices represents a critical factor in and a necessary fundament for the development of effective Computer Supported Collaborative Work (CSCW) ...
Markus Strohmaier, Stefanie N. Lindstaedt
SOUPS
2010
ACM
15 years 1 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
MOBIHOC
2004
ACM
15 years 2 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
MOBISYS
2009
ACM
15 years 10 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...