Sciweavers

336 search results - page 18 / 68
» Mobile values, new names, and secure communication
Sort
View
ISSRE
2003
IEEE
15 years 2 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
WMCSA
1999
IEEE
15 years 1 months ago
Broadcast of Consistent Data to Read-Only Transactions from Mobile Clients
In this paper, we study the inconsistency problem in data broadcast. While data items in a mobile computing system are being broadcast, update transactions may install new values ...
Kam-yiu Lam, Mei-Wau Au, Edward Chan
MA
2001
Springer
98views Communications» more  MA 2001»
15 years 2 months ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth
ENTCS
2007
150views more  ENTCS 2007»
14 years 9 months ago
On the Expressiveness of Mobile Synchronizing Petri Nets
In recent papers we have introduced Mobile Synchronizing Petri Nets, a new model for mobility based on coloured Petri Nets. It allows the description of systems composed of a coll...
Fernando Rosa Velardo, David de Frutos-Escrig, Olg...
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
15 years 2 months ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell