Sciweavers

323 search results - page 24 / 65
» Security Analysis of Mobile Java
Sort
View
SASN
2005
ACM
15 years 3 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
CCS
2009
ACM
15 years 1 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
WWW
2008
ACM
15 years 10 months ago
Deciphering mobile search patterns: a study of Yahoo! mobile search queries
In this paper we study the characteristics of search queries submitted from mobile devices using various Yahoo! oneSearch applications during a 2 months period in the second half ...
Jeonghee Yi, Farzin Maghoul, Jan O. Pedersen
OOPSLA
2004
Springer
15 years 3 months ago
Method-level phase behavior in java workloads
Java workloads are becoming more and more prominent on various computing devices. Understanding the behavior of a Java workload which includes the interaction between the applicat...
Andy Georges, Dries Buytaert, Lieven Eeckhout, Koe...
ATAL
2004
Springer
15 years 3 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz