Sciweavers

5665 search results - page 300 / 1133
» Introduction to Computer Security
Sort
View
CASSIS
2004
Springer
15 years 6 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
101
Voted
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 6 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
92
Voted
PERVASIVE
2004
Springer
15 years 6 months ago
ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing
Abstract. This paper describesa method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wi...
Jun Rekimoto, Takashi Miyaki, Michimune Kohno
178
Voted
ECAGENTS
2001
Springer
150views ECommerce» more  ECAGENTS 2001»
15 years 5 months ago
Security Issues in M-Commerce: A Usage-Based Taxonomy
Abstract. M–commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area—and the ra...
Suresh Chari, Parviz Kermani, Sean W. Smith, Leand...
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
15 years 4 months ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin