– Future wireless cellular networks such as High Speed Downlink Packet Access (HSDPA) and 1x EVolution Data Optimized (1xEV-DO) promise to revolutionize the mobile user’s wirel...
Bader Al-Manthari, Najah A. Abu Ali, Nidal Nasser,...
The need for flexible forms of serialisation arises under many circumstances, e.g. for doing high-level inter-process communication or to achieve persistence. Many languages, inc...
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...