Sciweavers

1226 search results - page 27 / 246
» Secure Mobile Gambling
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Formalising Java RMI with explicit code mobility
Alexander Ahern, Nobuko Yoshida
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
15 years 3 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
MSWIM
2005
ACM
15 years 3 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
INFOCOM
2012
IEEE
13 years 3 days ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
ACISP
2004
Springer
15 years 3 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...