Sciweavers

22 search results - page 2 / 5
» Preventing Illegal Usage of Mobile Phone Software
Sort
View
DIM
2007
ACM
13 years 10 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
IJDE
2007
105views more  IJDE 2007»
13 years 6 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
14 years 9 days ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...
MHCI
2004
Springer
13 years 11 months ago
Mobile Context Aware Systems: The Intelligence to Support Tasks and Effectively Utilise Resources
: The complex usage of mobile devices coupled with their limited resources in terms of display and processing suggests that being able to understand the context of the user would b...
Russell Beale, Peter Lonsdale
CHI
2008
ACM
13 years 8 months ago
Cross-channel mobile social software: an empirical study
In this paper, we introduce a prototype system designed to support mobile group socializing that has been appropriated for everyday use by 150 users over 18 months. The system sup...
Clint Heyer, Margot Brereton, Stephen Viller