Sciweavers

722 search results - page 102 / 145
» Offering Mobile Security as a Service
Sort
View
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Generic Centralized Downlink Scheduler for Next Generation Wireless Cellular Networks
– Future wireless cellular networks such as High Speed Downlink Packet Access (HSDPA) and 1x EVolution Data Optimized (1xEV-DO) promise to revolutionize the mobile user’s wirel...
Bader Al-Manthari, Najah A. Abu Ali, Nidal Nasser,...
ML
2007
ACM
122views Machine Learning» more  ML 2007»
14 years 9 months ago
Status report: hot pickles, and how to serve them
The need for flexible forms of serialisation arises under many circumstances, e.g. for doing high-level inter-process communication or to achieve persistence. Many languages, inc...
Andreas Rossberg, Guido Tack, Leif Kornstaedt
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
COMPSAC
2009
IEEE
15 years 4 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 3 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra