Sciweavers

313 search results - page 27 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
85
Voted
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 5 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
131
Voted
IACR
2011
292views more  IACR 2011»
14 years 3 days ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
95
Voted
IEEEARES
2009
IEEE
14 years 10 months ago
Reducing the Cost of Session Key Establishment
Scenarios such as online banking, mobile payment systems, stock trading, selling merchandise, and a host of other applications that need a high level of security have moved from th...
Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi S...
MOBISYS
2007
ACM
16 years 1 days ago
Context-aware access to public shared devices
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
David Jea, Ian Yap, Mani B. Srivastava
88
Voted
IEEEARES
2008
IEEE
15 years 6 months ago
An Ontological Approach to Secure MANET Management
Mobile Ad hoc Networks (MANETs) rely on dynamic configuration decisions to efficiently operate in a rapidly changing environment of limited resources. The ability of a MANET to ma...
Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine