Sciweavers

722 search results - page 47 / 145
» Offering Mobile Security as a Service
Sort
View
AISS
2010
97views more  AISS 2010»
14 years 7 months ago
The Naming Service of Multi-Agent for the Sensor Network Applications
The node selection for the migration of a mobile agent depends on the content of the referenced metadata in the naming space. The reliability of the migrated information is determ...
Yonsik Lee, Minseok Jang
MHCI
2009
Springer
15 years 4 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
SAC
2004
ACM
15 years 3 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
WISTP
2010
Springer
15 years 4 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
MOBISEC
2009
Springer
15 years 4 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...