Sciweavers

1462 search results - page 53 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
VTC
2008
IEEE
15 years 8 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
SAC
2005
ACM
15 years 7 months ago
Multi-coordination of mobile agents: a model and a component-based architecture
This paper proposes a model along with a reference software architecture enabling multi-coordination between distributed and mobile software agents. Multi-coordination allows agen...
Giancarlo Fortino, Wilma Russo
COMGEO
2010
ACM
15 years 5 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
ACISP
2006
Springer
15 years 8 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros