Sciweavers

236 search results - page 6 / 48
» Analyzing Privacy Designs of Mobile Social Networking Applic...
Sort
View
117
Voted
ICETE
2004
253views Business» more  ICETE 2004»
14 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
CCS
2001
ACM
15 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 3 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ATAL
2008
Springer
14 years 11 months ago
Mobile opportunistic commerce: mechanisms, architecture, and application
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
Ece Kamar, Eric Horvitz, Chris Meek
CHI
2010
ACM
15 years 4 months ago
Contacts 3.0: bringing together research and design teams to reinvent the phonebook
We present a narrative of the design of Contacts 3.0, a service and updated phonebook application on a mobile device that combines on-device communication with communication from ...
Frank R. Bentley, JoEllen Kames, Rafiq Ahmed, Rhia...