Herbivorous 发表于 2025-3-25 05:10:21
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications, secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.indenture 发表于 2025-3-25 10:15:51
An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response,usted state of a limited set of devices without relying on a networked service. We propose a . with user interaction that in conjunction with the AAT allows to prevent unauthorized access to an emergency mobile agent platform.Systemic 发表于 2025-3-25 13:10:13
Extending the Belgian eID Technology with Mobile Security Functionality,n. The proposed solution offers strong privacy, security and key management properties while increasing the accessibility of confidential e-mail compared to existing solutions (such as PGP and S/MIME).有权威 发表于 2025-3-25 17:01:41
,Protecting Privacy and Securing the Gathering of Location Proofs – The Secure Location Verificationhe Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.转向 发表于 2025-3-25 21:11:06
Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP,, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.Narrative 发表于 2025-3-26 04:09:33
A Distributed Data Storage Scheme for Sensor Networks,or storage. Capture or malfunction of one or more (less than a threshold number of sensors) does not compromise the data. The scheme provides protection against compromise of data in specific sensors due to physical capture or malfunction.enflame 发表于 2025-3-26 06:46:16
http://reply.papertrans.cn/87/8636/863512/863512_27.pngCAMP 发表于 2025-3-26 11:08:19
Context-Aware Monitoring of Untrusted Mobile Applications,e of identifying an event’s context. We demonstrate our development of a prototype system for the BlackBerry platform and show how it can defend the device against unseen malware more effectively than existing security tools.MARS 发表于 2025-3-26 16:31:23
Generating Random and Pseudorandom Sequences in Mobile Devices,performance) of integrating selected pseudorandom number generators in the Symbian OS environment. The main contribution of this paper is the identification and analysis of randomness sources in mobile devices and a practical proposal for their post-processing, including a prototype implementation.挥舞 发表于 2025-3-26 19:47:16
A Context-Aware Security Framework for Next Generation Mobile Networks,users. Based on context data acquisition and aggregation features, the framework uses contextual graphs to define security policies encompassing actions at different layers of communication systems’ architecture, while adapting to changing circumstances.