Sciweavers

188 search results - page 16 / 38
» Virtualized in-cloud security services for mobile devices
Sort
View
CSREASAM
2008
14 years 11 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
CCS
2009
ACM
15 years 10 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 2 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
COMPSEC
2008
138views more  COMPSEC 2008»
14 years 9 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
KBSE
2008
IEEE
15 years 3 months ago
Unit Testing of Flash Memory Device Driver through a SAT-Based Model Checker
Flash memory has become virtually indispensable in most mobile devices. In order for mobile devices to successfully provide services to users, it is essential that flash memory b...
Moonzoo Kim, Yunho Kim, Hotae Kim