Sciweavers

410 search results - page 36 / 82
» Software Protection with Code Mobility
Sort
View
ATAL
2006
Springer
15 years 2 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 3 days ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
65
Voted
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 5 months ago
Interactive Error Control for Mobile Video Telephony
—Error robust video communication for hand-held devices is a delicate task because of limited computational resources and hostile channel conditions in mobile environments. The l...
Waqar Zia, Tauseef Afzal, Wen Xu, Günther Lie...
CSREASAM
2004
15 years 1 days ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
USENIX
2007
15 years 29 days ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...