Sciweavers

313 search results - page 46 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
COMPGEOM
2001
ACM
15 years 1 months ago
Discrete mobile centers
We propose a new randomized algorithm for maintaining a set of clusters among moving nodes in the plane. Given a specified cluster radius, our algorithm selects and maintains a va...
Jie Gao, Leonidas J. Guibas, John Hershberger, Li ...
MOBISYS
2009
ACM
15 years 10 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
CCS
2010
ACM
14 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
WD
2010
14 years 7 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla
CODASPY
2012
13 years 5 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning