Sciweavers

1462 search results - page 233 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
CCS
2007
ACM
15 years 8 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
SACMAT
2005
ACM
15 years 7 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
MOBISYS
2007
ACM
16 years 1 months ago
SmartSiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devi...
Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu ...
ICWMC
2006
IEEE
15 years 8 months ago
An Overview of MAC Protocols with Directional Antennas in Wireless ad hoc Networks
Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc net...
Hongning Dai, Kam-Wing Ng, Min-You Wu
SIES
2007
IEEE
15 years 8 months ago
Architecture and Implementation of an Embedded Wormhole
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
Hugo Ortiz, Antonio Casimiro, Paulo Veríssi...