<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Vigil / Secure Centaurus]]> http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus 2000-01-01 <![CDATA[A Location-Based Mechanism for Mobile Device Security]]> http://ebiquity.umbc.edu/paper/html/id/647/A-Location-Based-Mechanism-for-Mobile-Device-Security 2009-03-30 <![CDATA[Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV]]> http://ebiquity.umbc.edu/paper/html/id/364/Threshold-based-Intrusion-Detection-in-Ad-Hoc-Networks-and-Secure-AODV 2007-05-09 <![CDATA[Proximity-Based Authentication for Mobile Devices]]> http://ebiquity.umbc.edu/paper/html/id/450/Proximity-Based-Authentication-for-Mobile-Devices 2005-06-20 <![CDATA[Secure Routing and Intrusion Detection in Ad Hoc Networks]]> http://ebiquity.umbc.edu/paper/html/id/208/Secure-Routing-and-Intrusion-Detection-in-Ad-Hoc-Networks 2005-03-08 <![CDATA[A Unified Framework for Mobile Device Security]]> http://ebiquity.umbc.edu/paper/html/id/646/A-Unified-Framework-for-Mobile-Device-Security 2004-09-30 <![CDATA[A Framework for Multi-Mode Authentication: Overview and Implementation Guide]]> http://ebiquity.umbc.edu/paper/html/id/644/A-Framework-for-Multi-Mode-Authentication-Overview-and-Implementation-Guide 2003-08-10 <![CDATA[Picture Password: A Visual Login Technique for Mobile Devices]]> http://ebiquity.umbc.edu/paper/html/id/643/Picture-Password-A-Visual-Login-Technique-for-Mobile-Devices 2003-07-30 <![CDATA[Security Policy Management for Handheld Devices]]> http://ebiquity.umbc.edu/paper/html/id/642/Security-Policy-Management-for-Handheld-Devices 2003-06-30 <![CDATA[Policy Expression and Enforcement for Handheld Devices]]> http://ebiquity.umbc.edu/paper/html/id/645/Policy-Expression-and-Enforcement-for-Handheld-Devices 2003-05-30 <![CDATA[Assigning and Enforcing Security Policies on Handheld Devices]]> http://ebiquity.umbc.edu/paper/html/id/640/Assigning-and-Enforcing-Security-Policies-on-Handheld-Devices 2002-05-30