Sciweavers

127 search results - page 21 / 26
» Gaps and future directions in mobile security research
Sort
View
HICSS
2000
IEEE
124views Biometrics» more  HICSS 2000»
15 years 2 months ago
An Empirical Study of Distribution based on Voyager: A Performance Analysis
The paper describes the model, implementation and experimental evaluation of a distributed Kohonen Neural Network application (Kohonen Application). The aim of this research is to...
Sérgio Viademonte, Frada Burstein, Fá...
91
Voted
CODES
2006
IEEE
15 years 4 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
GI
2001
Springer
15 years 3 months ago
Towards a Novel Architecture to Support Universal Location Awareness
—The rapid advances in a wide range of wireless access technologies along with an industry-wide IP-convergence have set up the stage for context-aware computing. The “location...
Amiya Bhattacharya, Abhishek Roy, Sajal K. Das
GLOBECOM
2009
IEEE
15 years 2 months ago
Multi-User Cooperative Communications with Relay-Coding for Uplink IMT-Advanced 4G Systems
Adoption of relay stations has been commonly accepted as a key technique for future IMTadvanced 4G systems to improve the link performance. While study in relay systems is often c...
Lei Cao, Jinyun Zhang, Norio Kanno
80
Voted
ACISP
2004
Springer
15 years 4 months ago
Theoretical Analysis of XL over Small Fields
Abstract. XL was first introduced to solve determined or overdetermined systems of equations over a finite field as an “algebraic attack” against multivariate cryptosystems....
Bo-Yin Yang, Jiun-Ming Chen