-
1
-
-
0042063842
-
Wireless security is different
-
ISSN 0018-9162. doi:
-
W.A. Arbaugh Wireless security is different Computer 36 8 2003 99 101 ISSN 0018-9162. doi: http://dx.doi.org/10.1109/MC.2003.1220591
-
(2003)
Computer
, vol.36
, Issue.8
, pp. 99-101
-
-
Arbaugh, W.A.1
-
2
-
-
79960571305
-
Wireless security techniques: An overview
-
New York, NY, USA: ACM Press ISBN 1-59593-048-5. doi: http://doi.acm.org/10.1145/1059524.1059541
-
Bhagyavati, Summers WC, Anthony D. Wireless security techniques: an overview. In: Proceedings of the first annual conference on information security curriculum development (InfoSecCD'04), New York, NY, USA: ACM Press; 2004. p. 8287. ISBN 1-59593-048-5. doi: http://doi.acm.org/10.1145/1059524.1059541.
-
(2004)
Proceedings of the First Annual Conference on Information Security Curriculum Development (InfoSecCD'04)
, pp. 82-87
-
-
Bhagyavati1
Summers, W.C.2
Anthony, D.3
-
4
-
-
63049091681
-
From desktop to mobile: Examining the security experience
-
R.A. Botha, S.M. Furnell, and N.L. Clarke From desktop to mobile: examining the security experience Computers & Security 28 34 2009 130 137
-
(2009)
Computers & Security
, vol.28
, Issue.34
, pp. 130-137
-
-
Botha, R.A.1
Furnell, S.M.2
Clarke, N.L.3
-
5
-
-
0035704358
-
Middleware for mobile computing: Awareness vs. transparency
-
Washington, DC, USA: IEEE Computer Society
-
Capra L, Emmerich W, Mascolo C. Middleware for mobile computing: awareness vs. transparency. In: Proceedings of the eighth workshop on hot topics in operating systems (HOTOS'01), Washington, DC, USA: IEEE Computer Society; 2001. p. 164.
-
(2001)
Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HOTOS'01)
, pp. 164
-
-
Capra, L.1
Emmerich, W.2
Mascolo, C.3
-
6
-
-
11144346905
-
Exploiting reflection in mobile computing middleware
-
ISSN 1559-1662; doi:
-
L. Capra, G.S. Blair, C. Mascolo, W. Emmerich, and P. Grace Exploiting reflection in mobile computing middleware ACM SIGMOBILE Mobile Computing and Communications Review 6 4 2002 34 44 ISSN 1559-1662; doi: http://doi.acm.org/10. 1145/643550.643553
-
(2002)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.6
, Issue.4
, pp. 34-44
-
-
Capra, L.1
Blair, G.S.2
Mascolo, C.3
Emmerich, W.4
Grace, P.5
-
7
-
-
0242579167
-
Carisma: Context-aware reflective middleware system for mobile applications
-
L. Capra, W. Emmerich, and C. Mascolo Carisma: context-aware reflective middleware system for mobile applications IEEE Transactions on Software Engineering 29 10 October 2003 929 945
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.10
, pp. 929-945
-
-
Capra, L.1
Emmerich, W.2
Mascolo, C.3
-
8
-
-
33745149251
-
A context-centric security middleware for service provisioning in pervasive computing
-
Washington, DC, USA: IEEE Computer Society ISBN 0-7695-2262-9. doi: http://dx.doi.org/10.1109/SAINT.2005.2
-
Corradi A, Montanari R, Tibaldi D, Toninelli A. A context-centric security middleware for service provisioning in pervasive computing. In: Proceedings of the 2005 symposium on applications and the internet (SAINT'05), Washington, DC, USA: IEEE Computer Society; 2005. p. 421429. ISBN 0-7695-2262-9. doi: http://dx.doi.org/10.1109/SAINT.2005.2.
-
(2005)
Proceedings of the 2005 Symposium on Applications and the Internet (SAINT'05)
, pp. 421-429
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
Toninelli, A.4
-
11
-
-
69249229584
-
Secure network coding for wireless mesh networks: Threats, challenges, and directions
-
ISSN 0140-3664. doi:
-
J. Dong, R. Curtmola, and C. Nita-Rotaru Secure network coding for wireless mesh networks: threats, challenges, and directions Computer Communications 32 17 2009 1790 1801 ISSN 0140-3664. doi: http://dx.doi.org/10. 1016/j.comcom.2009.07.010
-
(2009)
Computer Communications
, vol.32
, Issue.17
, pp. 1790-1801
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
12
-
-
12444260716
-
A framework for heterogeneous middleware security
-
April 2004 ISBN 0-7695-2132-0. doi: http://doi.ieeecomputersociety.org/ 10.1109/IPDPS.2004.1303059
-
Foley SN, Quillinan TB, O'Connor M, Mulcahy BP, Morrison JP. A framework for heterogeneous middleware security. In: Proceedings of the 18th international parallel and distributed processing symposium (IPDPS'04), vol. 02, Los Alamitos, CA, USA: IEEE Computer Society; April 2004. p. 108b. ISBN 0-7695-2132-0. doi: http://doi.ieeecomputersociety.org/10.1109/IPDPS.2004. 1303059.
-
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS'04), Vol. 02, Los Alamitos, CA, USA: IEEE Computer Society
, pp. 108
-
-
Foley, S.N.1
Quillinan, T.B.2
O'Connor, M.3
Mulcahy, B.P.4
Morrison, J.P.5
-
13
-
-
0026137432
-
Mpeg: A video compression standard for multimedia applications
-
ISSN 0001-0782. doi:
-
D. Le Gall Mpeg: a video compression standard for multimedia applications Communications of the ACM 34 4 1991 46 58 ISSN 0001-0782. doi: http://doi.acm.org/10.1145/103085.103090
-
(1991)
Communications of the ACM
, vol.34
, Issue.4
, pp. 46-58
-
-
Le Gall, D.1
-
15
-
-
84947248224
-
Sequential abstract-state machines capture sequential algorithms
-
ISSN 1529-3785. doi:
-
Y. Gurevich Sequential abstract-state machines capture sequential algorithms ACM Transactions on Computational Logic 1 1 2000 77 111 ISSN 1529-3785. doi: http://doi.acm.org/10.1145/343369.343384
-
(2000)
ACM Transactions on Computational Logic
, vol.1
, Issue.1
, pp. 77-111
-
-
Gurevich, Y.1
-
16
-
-
77955412458
-
-
Karygiannis T, Owens L. Wireless network security: 802.11, Bluetooth, and handheld devices. NIST, July 2002
-
Karygiannis T, Owens L. Wireless network security: 802.11, Bluetooth, and handheld devices. NIST, July 2002. doi: http://csrc.nist.gov/publications/ drafts.html.
-
-
-
-
17
-
-
18844368010
-
Intellectual property management on mpeg-4 video for hand-held device and mobile video streaming service
-
ISSN 0098-3063. doi:
-
G. Kim, D. Shin, and D. Shin Intellectual property management on mpeg-4 video for hand-held device and mobile video streaming service IEEE Transactions on Consumer Electronics 51 1 February 2005 139 143 ISSN 0098-3063. doi: 10.1109/TCE.2005.1405711
-
(2005)
IEEE Transactions on Consumer Electronics
, vol.51
, Issue.1
, pp. 139-143
-
-
Kim, G.1
Shin, D.2
Shin, D.3
-
18
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
DOI 10.1145/1161289.1161297, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
Li Z, Xu W, Miller R, Trappe W. Securing wireless systems via lower layer enforcements. In: Proceedings of the fifth ACM workshop on wireless security (WiSe'06), New York, NY, USA: ACM Press; 2006. p. 3342. ISBN 1-59593-557-6. doi: http://doi.acm.org/10.1145/1161289.1161297. (Pubitemid 46634300)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 33-42
-
-
Zang, L.1
Wenyuan, X.2
Miller, R.3
Trappe, W.4
-
20
-
-
0036282017
-
XMIDDLE: A data-sharing middleware for mobile computing
-
DOI 10.1023/A:1015584805733
-
C. Mascolo, L. Capra, S. Zachariadis, and W. Emmerich Xmiddle: a data-sharing middleware for mobile computing Wireless Personal Communications 21 1 2002 77 103 ISSN 0929-6212. doi: http://dx.doi.org/10.1023/A:1015584805733 (Pubitemid 34630509)
-
(2002)
Wireless Personal Communications
, vol.21
, Issue.1
, pp. 77-103
-
-
Mascolo, C.1
Capra, L.2
Zachariadis, S.3
Emmerich, W.4
-
21
-
-
0040288669
-
Cryptographic security techniques for wireless networks
-
D. Patiyoot, and S.J. Shepherd Cryptographic security techniques for wireless networks ACM SIGOPS Operating Systems Review 33 2 1999 36 50 ISSN 0163-5980. doi: http://doi.acm.org/10.1145/311094.311104 (Pubitemid 129545451)
-
(1999)
Operating Systems Review (ACM)
, vol.33
, Issue.2
, pp. 36-50
-
-
Patiyoot, D.1
Shepherd, S.J.2
-
23
-
-
33745922391
-
Wireless hotspots: Petri dish of wireless security
-
ISSN 0001-0782. doi:
-
B. Potter Wireless hotspots: petri dish of wireless security Communications of the ACM 49 6 2006 50 56 ISSN 0001-0782. doi: http://doi.acm.org/10.1145/1132469.1132501
-
(2006)
Communications of the ACM
, vol.49
, Issue.6
, pp. 50-56
-
-
Potter, B.1
-
24
-
-
0036957308
-
Securing wireless data: System architecture challenges
-
New York, NY, USA: ACM Press ISBN 1-58113-576-9. doi: http://doi.acm.org/10.1145/581199.581243
-
Ravi S, Raghunathan A, Potlapally N. Securing wireless data: system architecture challenges. In: Proceedings of the 15th international symposium on system synthesis (ISSS'02), New York, NY, USA: ACM Press; 2002. p. 195200. ISBN 1-58113-576-9. doi: http://doi.acm.org/10.1145/581199.581243.
-
(2002)
Proceedings of the 15th International Symposium on System Synthesis (ISSS'02)
, pp. 195-200
-
-
Ravi, S.1
Raghunathan, A.2
Potlapally, N.3
-
26
-
-
77955432080
-
-
RSA Security. Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era. Press release, June 2007
-
RSA Security. Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era. Press release, June 2007. 〈 http://www.rsa.com/press-release.aspx?id=8451 〉.
-
-
-
-
27
-
-
0004242258
-
-
Krieger Publishing Co., Inc. Melbourne, FL, USA
-
J.E. Savage The complexity of computing 1987 Krieger Publishing Co., Inc. Melbourne, FL, USA
-
(1987)
The Complexity of Computing
-
-
Savage, J.E.1
-
28
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
Washington, DC, USA: IEEE Computer Society ISBN 0-7695-1748-X
-
Slijepcevic S, Potkonjak M, Tsiatsis V, Zimbeck S, Srivastava MB. On communication security in wireless ad-hoc sensor networks. In: Proceedings of the 11th IEEE international workshops on enabling technologies (WETICE'02), Washington, DC, USA: IEEE Computer Society; 2002. p. 139144. ISBN 0-7695-1748-X.
-
(2002)
Proceedings of the 11th IEEE International Workshops on Enabling Technologies (WETICE'02)
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
29
-
-
32144462991
-
Application of synchronous dynamic encryption system in mobile wireless domains
-
DOI 10.1145/1089761.1089766, Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
Soliman HS, Omari M. Application of synchronous dynamic encryption system in mobile wireless domains. In: Proceedings of the first ACM international workshop on quality of service & security in wireless and mobile networks (Q2SWinet'05), New York, NY, USA: ACM Press; 2005. p. 2430. ISBN 1-59593-241-0. doi: http://doi.acm.org/10.1145/1089761.1089766. (Pubitemid 43206618)
-
(2005)
Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 24-30
-
-
Soliman, H.S.1
Omari, M.2
-
30
-
-
77349091593
-
Access and service convergence over the mobile interneta survey
-
10.1016/j.comnet.2009.08.017
-
P. TalebiFard, T. Wong, and V.C.M. Leung Access and service convergence over the mobile interneta survey Computer Networks 54 4 2010 545 557 10.1016/j.comnet.2009.08.017 ISSN 1389-1286. Advances in Wireless and Mobile Networks
-
(2010)
Computer Networks
, vol.54
, Issue.4
, pp. 545-557
-
-
Talebifard, P.1
Wong, T.2
Leung, V.C.M.3
-
32
-
-
0042417066
-
Challenges designing next-generation middleware systems
-
ISSN 0001-0782. doi:
-
A. Tripathi Challenges designing next-generation middleware systems Communications of the ACM 45 6 2002 39 42 ISSN 0001-0782. doi: http://doi.acm.org/10.1145/508448.508471
-
(2002)
Communications of the ACM
, vol.45
, Issue.6
, pp. 39-42
-
-
Tripathi, A.1
-
33
-
-
77955424759
-
-
Wiktionary. Wiktionary, January 2009
-
Wiktionary. Wiktionary, January 2009. 〈 http://en.wiktionaty.org 〉.
-
-
-
-
34
-
-
78751644528
-
Scheduling security-critical multimedia applications in heterogeneous networks
-
press. ISSN 0140-3664. doi: 10.1016/j.comcom.2010.01.009.To appear
-
Zhou L, Vasilakos AV, Xiong N, Zhang Y, Lian S. Scheduling security-critical multimedia applications in heterogeneous networks. Computer Communications, in press. ISSN 0140-3664. doi: 10.1016/j.comcom.2010.01.009. To appear.
-
Computer Communications
-
-
Zhou, L.1
Vasilakos, A.V.2
Xiong, N.3
Zhang, Y.4
Lian, S.5
|