Sciweavers

2897 search results - page 42 / 580
» Mobile Code Security
Sort
View
CSREASAM
2006
15 years 3 months ago
Securing Collaborative Applications
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...
PSYCHNOLOGY
2007
83views more  PSYCHNOLOGY 2007»
15 years 1 months ago
Mobile Fantasies on Film: Gathering Metaphoric Evidence of Mobile Symbiosis and the Mobile Imaginary
Mobile communication studies are often limited in their ability to capture the entire domain of a mobile phone call. These limitations often require that researchers separately st...
Kathleen M. Cumiskey
IADIS
2004
15 years 3 months ago
SMS transmission using PDU mode and 7-bit coding scheme
This paper describes the design and implementation of an SMS transmission system using the PDU (Protocol Data Unit) mode of a GSM (Global System for Mobile Communications) modem. ...
Andrés Ortiz, Alberto Prieto
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 7 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
CL
2002
Springer
15 years 2 months ago
Security boundaries in mobile ambients
A new notion of security boundary is introduced to model multilevel security policies in the scenario of mobile systems, within Cardelli and Gordon's "pure" mobile ...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi