Sciweavers

1462 search results - page 66 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ACSW
2004
15 years 3 months ago
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the ...
John Page, Arkady B. Zaslavsky, Maria Indrawan
ICOIN
2001
Springer
15 years 6 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
ASSETS
2010
ACM
15 years 2 months ago
Leveraging proprioception to make mobile phones more accessible to users with visual impairments
Accessing the advanced functions of a mobile phone is not a trivial task for users with visual impairments. They rely on screen readers and voice commands to discover and execute ...
Frank Chun Yat Li, David Dearman, Khai N. Truong
CAISE
2003
Springer
15 years 7 months ago
Ubiquitous Usability: Exploring Mobile Interfaces within the Context of a Theoretical Model
Mobile commerce (m-Commerce), which allows for anytime/anywhere access to information and services, shows great potential. Ubiquitous access to information systems is critical to e...
Khaled Hassanein, Milena M. Head
COLCOM
2007
IEEE
15 years 8 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham