Sciweavers

336 search results - page 8 / 68
» Mobile values, new names, and secure communication
Sort
View
WWW
2007
ACM
15 years 10 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
WS
2005
ACM
15 years 3 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 3 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Temporal Transcoding for Mobile Video Communication
Third generation mobile communication systems will provide more advanced types of interactive and distribution services, and video is one of the most prominent applications for mu...
Maurizio A. Bonuccelli, Francesca Lonetti, Frances...
71
Voted
CSREASAM
2006
14 years 11 months ago
Securing Collaborative Applications
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...