Sciweavers

35 search results - page 5 / 7
» On Optimistic Methods for Mobile Transactions
Sort
View
IPPS
2007
IEEE
15 years 3 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
COMCOM
2007
83views more  COMCOM 2007»
14 years 9 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
DEXAW
1998
IEEE
98views Database» more  DEXAW 1998»
15 years 1 months ago
Supporting Read-Only Transactions in Wireless Broadcasting
Wireless communications support a new form of data delivery in which servers broadcast data to a number of clients that listen to the broadcast channel and retrieve data of intere...
Evaggelia Pitoura
SAC
2004
ACM
15 years 3 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
PVLDB
2010
184views more  PVLDB 2010»
14 years 8 months ago
Adaptive Logging for Mobile Device
Nowadays, due to the increased user requirements of the fast and reliable data management operation for mobile applications, major device vendors use embedded DBMS for their mobil...
Young-Seok Kim, Heegyu Jin, Kyoung-Gu Woo