Sciweavers

13 search results - page 1 / 3
» Malicious Code Moves to Mobile Devices
Sort
View
38
Voted
COMPUTER
2000
65views more  COMPUTER 2000»
14 years 9 months ago
Malicious Code Moves to Mobile Devices
Neal Leavitt
WMCSA
2008
IEEE
15 years 3 months ago
Screen codes: visual hyperlinks for displays
We present ‘Screen codes’ - a space- and time-efficient, aesthetically compelling method for transferring data from a display to a camera-equipped mobile device. Screen codes ...
John P. Collomosse, Tim Kindberg
87
Voted
ISCAPDCS
2004
14 years 10 months ago
Location Based Access to Moving Data Sources
Location based services in mobile environments have been recognized as a challenging problem that calls for new service models and dynamic strategies. The problem becomes even har...
Shiow-yang Wu, Wei-chung Ko
MOBICOM
1996
ACM
15 years 1 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
CCS
2007
ACM
15 years 3 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...