Sciweavers

644 search results - page 56 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 12 days ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
MSWIM
2003
ACM
15 years 5 months ago
Adaptive range control using directional antennas in mobile ad hoc networks
This paper presents ARC (Adaptive Range Control), a communication range control mechanism using directional antennas to be implemented across multiple layers. ARC uses directional...
Mineo Takai, Junlan Zhou, Rajive Bagrodia
DAIS
2006
15 years 1 months ago
Towards Context-Aware Transaction Services
Abstract. For years, transactional protocols have been defined for particular application needs. Traditionally, when implementing a transaction service, a protocol is chosen and re...
Romain Rouvoy, Patricia Serrano-Alvarado, Philippe...
CHI
2007
ACM
16 years 7 days ago
"Jump and refine" for rapid pointing on mobile phones
Standard input devices for mobile phones are directional keys and discrete thumb-joysticks. These devices are dedicated to the discrete GUIs of the phones (eg. scroll lists and sm...
Martin Hachet, Joachim Pouderoux, Florence Tyndiuk...
CSREASAM
2006
15 years 1 months ago
Enhanced Group Key Generation Protocol
Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, th...
Sunghyuck Hong, Noé Lopez-Benitez