Sciweavers

1226 search results - page 44 / 246
» Secure Mobile Gambling
Sort
View
ESORICS
2006
Springer
15 years 1 months ago
A Formal Model of Access Control for Mobile Interactive Devices
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Frédéric Besson, Guillaume Dufay, Th...
SAINT
2007
IEEE
15 years 4 months ago
A HIP Based Network Mobility Protocol
– The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and ch...
Szabolcs Nováczki, László Bok...
MAS
1998
Springer
153views Communications» more  MAS 1998»
15 years 1 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...
INFOCOM
2012
IEEE
13 years 5 days ago
Fine-grained private matching for proximity-based mobile social networking
—Proximity-based mobile social networking (PMSN) refers to the social interaction among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their ...
Rui Zhang 0007, Yanchao Zhang, Jinyuan Sun, Guanhu...
CCS
2010
ACM
15 years 1 months ago
Apex: extending Android permission model and enforcement with user-defined runtime constraints
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giv...
Mohammad Nauman, Sohail Khan, Xinwen Zhang