News
Abstract: Mobile security draws more attention while the mobile device gains its popularity. Malwares just like viruses, botnet and worms, become concerns since the frequently leakage of personal ...
Abstract: We use a structural operational semantics which drives ... We also consider two case studies from the literature involving mobile computation to show that our framework is feasible.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results