Sciweavers

6861 search results - page 140 / 1373
» Security for Ubiquitous Computing
Sort
View
MOBISEC
2009
Springer
15 years 10 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...
JALC
2006
125views more  JALC 2006»
15 years 4 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
132
Voted
JSAC
2006
139views more  JSAC 2006»
15 years 4 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang
CORR
2010
Springer
132views Education» more  CORR 2010»
15 years 1 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
EEE
2004
IEEE
15 years 7 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar