-
2
-
-
13844302727
-
Analyzing mobile transactions support for DBMS
-
P. S. Alvirado, C. L. Roncancio, and M. Adiba, "Analyzing mobile transactions support for DBMS," The 12th International Workshop on Database and Expert Systems Applications, pp. 595-600, 2001.
-
(2001)
The 12th International Workshop on Database and Expert Systems Applications
, pp. 595-600
-
-
Alvirado, P.S.1
Roncancio, C.L.2
Adiba, M.3
-
3
-
-
16644398055
-
Performance Analysis of Cryptographic Protocols in Handheld Devices
-
University of Dublin
-
P. G. Argyroudis, R. Verma, H. Tewari, and D. O. Mahony, Performance Analysis of Cryptographic Protocols in Handheld Devices, The Technical Report TCD-CS-2003-46, University of Dublin, 2003.
-
(2003)
The Technical Report TCD-CS-2003-46
-
-
Argyroudis, P.G.1
Verma, R.2
Tewari, H.3
Mahony, D.O.4
-
4
-
-
34548771396
-
Transaction based authentication scheme for mobile Communication: A cognitive agent based Approach,
-
B. S. Babu, and P. Venkataram, "Transaction based authentication scheme for mobile Communication: A cognitive agent based Approach," The 3rd International Workshop on Security in Systems and Networks (SSN 2007), Conjunction with IPDPS 2007, pp. 1-8, 2007.
-
(2007)
The 3rd International Workshop on Security in Systems and Networks (SSN 2007), Conjunction with IPDPS
, vol.2007
, pp. 1-8
-
-
Babu, B.S.1
Venkataram, P.2
-
5
-
-
84875331501
-
Security of protocols against guessing attacks
-
M. Baudet, "Security of protocols against guessing attacks," SECSI '05, pp. 16-25, 2005.
-
(2005)
SECSI '05
, pp. 16-25
-
-
Baudet, M.1
-
6
-
-
27544491391
-
VMSoar: a cognitive agent for network security
-
D. P. Benjamin, R. S. Iyer, and Archana Perumal, "VMSoar: a cognitive agent for network security," SPIE, vol. 5812, pp. 72-80, 2005.
-
(2005)
SPIE
, vol.5812
, pp. 72-80
-
-
Benjamin, D.P.1
Iyer, R.S.2
Perumal, A.3
-
7
-
-
0031651439
-
Advanced transaction processing in multilevel secure filestores
-
E. Bertino, S. Jajodia, L. Mancini, and I. Ray, "Advanced transaction processing in multilevel secure filestores," IEEE Transactions on Knowledge and Data Engineering, vol. 10, no. 1, pp. 120-135, 1998.
-
(1998)
IEEE Transactions on Knowledge and Data Engineering
, vol.10
, Issue.1
, pp. 120-135
-
-
Bertino, E.1
Jajodia, S.2
Mancini, L.3
Ray, I.4
-
8
-
-
0033723632
-
Network security management with intelligent agents
-
K. Boudaoud, H. Lubiod, R. Boutaba, and Z. Guessoum, "Network security management with intelligent agents," The Network Operations and Management Symposium NOMS 2000, pp. 579-592, 2000.
-
(2000)
The Network Operations and Management Symposium NOMS
, vol.2000
, pp. 579-592
-
-
Boudaoud, K.1
Lubiod, H.2
Boutaba, R.3
Guessoum, Z.4
-
9
-
-
0036749185
-
Behavior-based intrusion detection in mobile phone systems
-
A. Boukerche, and S. M. Mirela, "Behavior-based intrusion detection in mobile phone systems," Journal of Parallel and Distributed Computing, vol. 62, no. 9, pp. 1476-1490, 2002.
-
(2002)
Journal of Parallel and Distributed Computing
, vol.62
, Issue.9
, pp. 1476-1490
-
-
Boukerche, A.1
Mirela, S.M.2
-
10
-
-
84875348123
-
Wireless security attacks and defenses
-
J. Burke, B. Hartselle, B. Kneuven, and Bradley Morgan, "Wireless security attacks and defenses," Window Security, pp. 1-12, 2006.
-
(2006)
Window Security
, pp. 1-12
-
-
Burke, J.1
Hartselle, B.2
Kneuven, B.3
Morgan, B.4
-
11
-
-
0141967836
-
Usability for mobile commerce across multiple form factors
-
S. S. Chan, X. Fang, K. Brzezinski, Y. Zhow, S. Xu, and J. Lam, "Usability for mobile commerce across multiple form factors," Journal of Electronic Commerce Research, vol. 3, pp. 187-199, 2002.
-
(2002)
Journal of Electronic Commerce Research
, vol.3
, pp. 187-199
-
-
Chan, S.S.1
Fang, X.2
Brzezinski, K.3
Zhow, Y.4
Xu, S.5
Lam, J.6
-
15
-
-
0036980311
-
Performance analysis of elliptic curve cryptography for SSL
-
V. Gupta, S. Gupta, and S. Chang, "Performance analysis of elliptic curve cryptography for SSL," The ACM Workshop on Wireless Security, pp. 87-94, 2002.
-
(2002)
The ACM Workshop on Wireless Security
, pp. 87-94
-
-
Gupta, V.1
Gupta, S.2
Chang, S.3
-
16
-
-
2442449839
-
An Asymmetric Authentication Protocol for M-Commerce Applications
-
L. S. He, and N. Zhang, "An Asymmetric Authentication Protocol for M-Commerce Applications," The 8th IEEE International Symposium on Computers and Communication (ISCC'03), vol. 1, pp. 244-250, 2003.
-
(2003)
The 8th IEEE International Symposium on Computers and Communication (ISCC'03)
, vol.1
, pp. 244-250
-
-
He, L.S.1
Zhang, N.2
-
17
-
-
4143060331
-
Mobile user location update and paging under delay constraints
-
J. Ho, and I. Akyildiz, "Mobile user location update and paging under delay constraints," Wireless Networks, vol. 1, no. 4, pp. 413-425, 1995.
-
(1995)
Wireless Networks
, vol.1
, Issue.4
, pp. 413-425
-
-
Ho, J.1
Akyildiz, I.2
-
18
-
-
84875355721
-
-
(http://sourceforge.net/projects/agentfactory)
-
-
-
-
20
-
-
58049127785
-
Wireless PKI and distributed IDS for securing intranets and M-commerce
-
K. Hwang, "Wireless PKI and distributed IDS for securing intranets and M-commerce," The IEEE Third International Conference on Parallel and Distributed Computing, Applications, and Technologies (PDCAT 2002), pp. 1-16, 2002.
-
(2002)
The IEEE Third International Conference on Parallel and Distributed Computing, Applications, and Technologies (PDCAT 2002)
, pp. 1-16
-
-
Hwang, K.1
-
22
-
-
24944483338
-
Temporal analysis of the dynamics of beliefs, desires, and intentions
-
C. M. Jonker, J. Treur, and W. Vries, "Temporal analysis of the dynamics of beliefs, desires, and intentions," The Cognitive Science Quarterly (Special Issue on Desires, Goals, Intentions, and Values: Computational Architectures), vol. 2, pp. 471-494, 2002.
-
(2002)
The Cognitive Science Quarterly (Special Issue on Desires, Goals, Intentions and Values: Computational Architectures)
, vol.2
, pp. 471-494
-
-
Jonker, C.M.1
Treur, J.2
Vries, W.3
-
24
-
-
0038052870
-
Improving mobile authentication with new AAA protocols
-
H. Kim, and H. Afifi, "Improving mobile authentication with new AAA protocols," The IEEE International Conference on Communications, vol. 1, pp. 497-501, 2003.
-
(2003)
The IEEE International Conference on Communications
, vol.1
, pp. 497-501
-
-
Kim, H.1
Afifi, H.2
-
26
-
-
34548157765
-
Ticket-based authentication and payment protocol for mobile telecommunications systems
-
B. Lee, T. Kim, and S. Kang, "Ticket-based authentication and payment protocol for mobile telecommunications systems," The International Symposium on Dependable Computing, pp. 218-221, 2001.
-
(2001)
The International Symposium on Dependable Computing
, pp. 218-221
-
-
Lee, B.1
Kim, T.2
Kang, S.3
-
34
-
-
0032643561
-
An efficient authentication protocol for mobile networks
-
S. Shieh, F. Ho, and Y. Huang, "An efficient authentication protocol for mobile networks," Journal of Information Science and Engineering, vol. 15, pp. 505-520, 1999.
-
(1999)
Journal of Information Science and Engineering
, vol.15
, pp. 505-520
-
-
Shieh, S.1
Ho, F.2
Huang, Y.3
-
36
-
-
0033683319
-
An architecture of F(22N) multiplier for elliptic curves cryptosystem
-
S. Sutikno, and A. Surya, "An architecture of F(22N) multiplier for elliptic curves cryptosystem," The IS- CAS 2000 on Circuits and Systems, vol. 1, pp. 196-206, 2000.
-
(2000)
The IS-CAS 2000 on Circuits and Systems
, vol.1
, pp. 196-206
-
-
Sutikno, S.1
Surya, A.2
-
38
-
-
84969531832
-
Transaction management for m-commerce at a mobile terminal, The 36th Annual Hawaii International Conference on System Sciences
-
J. Veijalainen, V. Terziyan, and H. Tirri, "Transaction management for m-commerce at a mobile terminal," The 36th Annual Hawaii International Conference on System Sciences, pp. 89.1, 2003.
-
(2003)
-
-
Veijalainen, J.1
Terziyan, V.2
Tirri, H.3
|