메뉴 건너뛰기




Volumn 3968 LNCS, Issue , 2006, Pages 238-253

Secure mobile computing via public terminals

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR TELEPHONE SYSTEMS; COMPUTER KEYBOARDS; COMPUTER OPERATING SYSTEMS; DATA PROCESSING; PERSONAL DIGITAL ASSISTANTS; SECURITY OF DATA; SOFTWARE PROTOTYPING;

EID: 33745906238     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11748625_15     Document Type: Conference Paper
Times cited : (21)

References (28)
  • 2
    • 34548344520 scopus 로고    scopus 로고
    • June
    • Anti-Phishing Working Group (APWG). Phishing activity trends report, June 2005. http://antiphishing.org/.
    • (2005) Phishing Activity Trends Report
  • 6
    • 0034447799 scopus 로고    scopus 로고
    • WebSplitter: A unified XML framework for multi-device collaborative web browsing
    • ACM
    • Richard Han, Veronique Perret, and Mahmoud Naghshineh. WebSplitter: a unified XML framework for multi-device collaborative web browsing. In Proceedings of CSCW 2000. ACM, 2000.
    • (2000) Proceedings of CSCW 2000
    • Han, R.1    Perret, V.2    Naghshineh, M.3
  • 7
    • 1842712330 scopus 로고    scopus 로고
    • Text information extraction in images and video: A survey
    • Keechul Jung, Kwang In Kim, and Anil K. Jain. Text information extraction in images and video: a survey. Pattern Recognition, 37:977-997, 2004.
    • (2004) Pattern Recognition , vol.37 , pp. 977-997
    • Jung, K.1    Kwang In Kim2    Jain, A.K.3
  • 11
    • 0041386047 scopus 로고    scopus 로고
    • Using handhelds and PCs together
    • Brad A. Myers. Using handhelds and PCs together. Communications of the ACM, 44(11):34-41, 2001.
    • (2001) Communications of the ACM , vol.44 , Issue.11 , pp. 34-41
    • Myers, B.A.1
  • 12
    • 0007982230 scopus 로고    scopus 로고
    • What would you do with 100 MIPS on your wrist?
    • IBM Research, January
    • Chandra Narayanaswami, M. T. Raghunath, Noboru Kamijoh, and Tadonobu Inoue. What would you do with 100 MIPS on your wrist? Technical Report RC 22057 (98634), IBM Research, January 2001.
    • (2001) Technical Report , vol.RC 22057 98634
    • Narayanaswami, C.1    Raghunath, M.T.2    Kamijoh, N.3    Inoue, T.4
  • 14
    • 21644455714 scopus 로고    scopus 로고
    • Securing a remote terminal application with a mobile trusted device
    • Alina Oprea, Dirk Balfanz, Glenn Durfee, and Diana Smetters. Securing a remote terminal application with a mobile trusted device. In Proceedings of ACSA 2004. Available from http://www.acsa-admin.org/.
    • Proceedings of ACSA 2004
    • Oprea, A.1    Balfanz, D.2    Durfee, G.3    Smetters, D.4
  • 16
    • 19544393220 scopus 로고    scopus 로고
    • Opportunistic annexing for handheld devices: Opportunities and challenges
    • Jeffrey S. Pierce and Heather Mahaney. Opportunistic annexing for handheld devices: Opportunities and challenges. In Proceedings of HCIC 2004, 2004.
    • (2004) Proceedings of HCIC 2004
    • Pierce, J.S.1    Mahaney, H.2
  • 17
    • 0141494334 scopus 로고    scopus 로고
    • Fostering a symbiotic handheld environment
    • Mandayam Raghunath, Chandra Narayanaswami, and Claudio Pinhanez. Fostering a symbiotic handheld environment. Computer, 36(9):56-65, 2003.
    • (2003) Computer , vol.36 , Issue.9 , pp. 56-65
    • Raghunath, M.1    Narayanaswami, C.2    Pinhanez, C.3
  • 19
    • 0036785515 scopus 로고    scopus 로고
    • A composable framework for secure multi-modal access to Internet services from post-PC devices
    • Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, and Eric A. Brewer. A composable framework for secure multi-modal access to Internet services from post-PC devices. Mob. Netw. Appl., 7(5), 2002.
    • (2002) Mob. Netw. Appl. , vol.7 , Issue.5
    • Ross, S.J.1    Hill, J.L.2    Chen, M.Y.3    Joseph, A.D.4    Culler, D.E.5    Brewer, E.A.6
  • 20
    • 84941162494 scopus 로고    scopus 로고
    • Sorting through the hype of ubiquitous secure remote access and SSL VPNs
    • Ken Salchow. Sorting through the hype of ubiquitous secure remote access and SSL VPNs. SecurityDocs white paper, http://www.securitydocs.com/library/3103.
    • SecurityDocs White Paper
    • Salchow, K.1
  • 23
    • 84941164613 scopus 로고    scopus 로고
    • Google desktop search: Security threat?
    • Tom Spring. Google Desktop Search: Security Threat? Today@PCWorld. http://blogs.pcworld.com/staffblog/archives/000264.html
    • Today@PCWorld
    • Spring, T.1
  • 24
    • 0009511034 scopus 로고    scopus 로고
    • RealVNC Ltd.
    • T. Richardson, RealVNC Ltd. The RFB Protocol, 2005. http://www.realvnc.com/docs/rfbproto.pdf.
    • (2005) The RFB Protocol
    • Richardson, T.1
  • 25
    • 4544352621 scopus 로고    scopus 로고
    • Information Voyeurism: Social impact; of physically large displays on information privacy
    • ACM
    • Desney S. Tan and Mary Czerwinski. Information Voyeurism: Social impact; of physically large displays on information privacy. In Extended Abstracts of CHI 2003. ACM, 2003.
    • (2003) Extended Abstracts of CHI 2003
    • Tan, D.S.1    Czerwinski, M.2
  • 27
    • 84941160507 scopus 로고    scopus 로고
    • SSH transport layer protocol
    • T. Ylonen. SSH transport layer protocol. RFC 3667.
    • RFC , vol.3667
    • Ylonen, T.1
  • 28
    • 33745886052 scopus 로고    scopus 로고
    • The awareness-privacy tradeoff in video supported informal awareness: A study of image-filtering based techniques
    • Georgia Institute of Technology
    • Qiang Alex Zhao and John T. Stasko. The awareness-privacy tradeoff in video supported informal awareness: A study of image-filtering based techniques. Technical Report 98-16, Georgia Institute of Technology, 1998.
    • (1998) Technical Report , vol.98 , Issue.16
    • Qiang Alex Zhao1    Stasko, J.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.