File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Secure end-to-end browsing system with mobile composition

TitleSecure end-to-end browsing system with mobile composition
Authors
KeywordsData leakage
Secure Browsing
Mobile phone
Java applet
Issue Date2011
PublisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1800200
Citation
The 2011 International Conference on Internet Technology and Applications (iTAP 2011), Wuhan, China, 16-18 August 2011. In Conference Proceedings, 2011, p. 1-4 How to Cite?
AbstractTo fix the more and more serious leakage problem in remote access to confidential data, the paper designs and implements a secure end-to-end browsing system with mobile composition. It enables mobile-authenticated users to browse confidential files stored at server side using their personal computers securely. The authentication function is in real-time such that the system can stop the browsing function once it detects that the authenticated mobile is out of the communication range of user's personal computer. © 2011 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/152010
ISBN
References

 

DC FieldValueLanguage
dc.contributor.authorJiang, ZLen_US
dc.contributor.authorFang, Jen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2012-06-26T06:32:24Z-
dc.date.available2012-06-26T06:32:24Z-
dc.date.issued2011en_US
dc.identifier.citationThe 2011 International Conference on Internet Technology and Applications (iTAP 2011), Wuhan, China, 16-18 August 2011. In Conference Proceedings, 2011, p. 1-4en_US
dc.identifier.isbn978-1-4244-7255-0-
dc.identifier.urihttp://hdl.handle.net/10722/152010-
dc.description.abstractTo fix the more and more serious leakage problem in remote access to confidential data, the paper designs and implements a secure end-to-end browsing system with mobile composition. It enables mobile-authenticated users to browse confidential files stored at server side using their personal computers securely. The authentication function is in real-time such that the system can stop the browsing function once it detects that the authenticated mobile is out of the communication range of user's personal computer. © 2011 IEEE.en_US
dc.languageengen_US
dc.publisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1800200-
dc.relation.ispartofInternational Conference on Internet Technology and Applications (iTAP)en_US
dc.subjectData leakageen_US
dc.subjectSecure Browsingen_US
dc.subjectMobile phoneen_US
dc.subjectJava applet-
dc.titleSecure end-to-end browsing system with mobile compositionen_US
dc.typeConference_Paperen_US
dc.identifier.emailHui, LCK:hui@cs.hku.hken_US
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1109/ITAP.2011.6006420en_US
dc.identifier.scopuseid_2-s2.0-80052852619en_US
dc.identifier.hkuros211526-
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-80052852619&selection=ref&src=s&origin=recordpageen_US
dc.identifier.spage1-
dc.identifier.epage4-
dc.publisher.placeUnited States-
dc.identifier.scopusauthoridJiang, ZL=24344329800en_US
dc.identifier.scopusauthoridFang, J=36132767400en_US
dc.identifier.scopusauthoridHui, LCK=8905728300en_US
dc.identifier.scopusauthoridYiu, SM=7003282240en_US
dc.customcontrol.immutablesml 150422-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats