Sciweavers

1462 search results - page 60 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
I3E
2009
134views Business» more  I3E 2009»
14 years 11 months ago
Realizing Mobile Web Services for Dynamic Applications
Use of web services also on mobile devices becomes increasingly relevant. However, realizing such mobile web services based on the standard protocol stack is often inappropriate f...
Sonja Zaplata, Viktor Dreiling, Winfried Lamersdor...
ESCIENCE
2006
IEEE
15 years 5 months ago
Remote Control of Web 2.0-Enabled Laboratories from Mobile Devices
The design of WebLabs has traditionally been focused on the hardware rather than the software side. However, paying more importance to the software side can bring about important ...
Diego López de Ipiña, Javier Garc&ia...
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
15 years 11 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
NDSS
2005
IEEE
15 years 7 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
MOBIQUITOUS
2005
IEEE
15 years 7 months ago
Multi-Constraint Dynamic Access Selection in Always Best Connected Networks
Abstract— In future generation networks, various access technologies, such as Wi-Fi, Bluetooth, GPRS and UMTS, etc., are simultaneously available to mobile devices. They vary in ...
Bo Xing, Nalini Venkatasubramanian