Sciweavers

1030 search results - page 1 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
SPW
1997
Springer
13 years 9 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...
TPDS
2008
231views more  TPDS 2008»
13 years 4 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
FIDJI
2004
Springer
13 years 10 months ago
Coordinated Anonymous Peer-to-Peer Connections with MoCha
Abstract. MoCha is an exogenous coordination middleware for distributed communication based on mobile channels. Channels allow anonymous, and point-to-point communication among nod...
Juan Guillen Scholten, Farhad Arbab
IAJIT
2008
139views more  IAJIT 2008»
13 years 5 months ago
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
: Internet-based Mobile Ad Hoc Networking (MANET) is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in ...
Velmurugan Ayyadurai, Rajaram Ramasamy
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
13 years 9 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...