Sciweavers

201 search results - page 35 / 41
» Applications and Security of Next-Generation, User-Centric W...
Sort
View
MOBISYS
2009
ACM
15 years 10 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
SAC
2003
ACM
15 years 2 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...
MOBISYS
2008
ACM
15 years 9 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
PERCOM
2007
ACM
15 years 9 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
MOBISYS
2007
ACM
15 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi