-
http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus
2000-01-01
-
http://ebiquity.umbc.edu/paper/html/id/647/A-Location-Based-Mechanism-for-Mobile-Device-Security
2009-03-30
-
http://ebiquity.umbc.edu/paper/html/id/364/Threshold-based-Intrusion-Detection-in-Ad-Hoc-Networks-and-Secure-AODV
2007-05-09
-
http://ebiquity.umbc.edu/paper/html/id/450/Proximity-Based-Authentication-for-Mobile-Devices
2005-06-20
-
http://ebiquity.umbc.edu/paper/html/id/208/Secure-Routing-and-Intrusion-Detection-in-Ad-Hoc-Networks
2005-03-08
-
http://ebiquity.umbc.edu/paper/html/id/646/A-Unified-Framework-for-Mobile-Device-Security
2004-09-30
-
http://ebiquity.umbc.edu/paper/html/id/644/A-Framework-for-Multi-Mode-Authentication-Overview-and-Implementation-Guide
2003-08-10
-
http://ebiquity.umbc.edu/paper/html/id/643/Picture-Password-A-Visual-Login-Technique-for-Mobile-Devices
2003-07-30
-
http://ebiquity.umbc.edu/paper/html/id/642/Security-Policy-Management-for-Handheld-Devices
2003-06-30
-
http://ebiquity.umbc.edu/paper/html/id/645/Policy-Expression-and-Enforcement-for-Handheld-Devices
2003-05-30
-
http://ebiquity.umbc.edu/paper/html/id/640/Assigning-and-Enforcing-Security-Policies-on-Handheld-Devices
2002-05-30