Sciweavers

1226 search results - page 36 / 246
» Secure Mobile Gambling
Sort
View
LISA
2008
15 years 21 hour ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
OTM
2007
Springer
15 years 3 months ago
A Novel Overlay Network for a Secure Global Home Agent Dynamic Discovery
Mobile IP and Network Mobility are the IETF proposals to obtain mobility. However, both of them have routing limitations, due to the presence of an entity (Home Agent) in the commu...
Ángel Cuevas, Rubén Cuevas Rum&iacut...
NBIS
2007
Springer
15 years 3 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
94
Voted
CHI
2009
ACM
15 years 10 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...
SKG
2006
IEEE
15 years 3 months ago
Multi-layer Grid Portal Architecture Based on Mobile Agent
Many Grid portal architectures have three layers: browser, portal and Grid environment. We design a multi-layer Grid portal architecture, which introduced Mobile Agent; the mobile...
Fang Juan