Sciweavers

313 search results - page 37 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
SIGCOMM
2010
ACM
14 years 10 months ago
Experimenting with multipath TCP
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...
Sébastien Barré, Olivier Bonaventure...
TPDS
2010
99views more  TPDS 2010»
14 years 8 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
ICMCS
2006
IEEE
185views Multimedia» more  ICMCS 2006»
15 years 3 months ago
DMB (Digital Multimedia Broadcasting) Voice EPG Application
Recently, mobile TV is becoming a mainstream service in mobile broadcasting scenario, where requires lots of mobile factors such as robust transmission, high performance and easy ...
Bong-Ho Lee, So Park, Heejeong Kim, Chung-Hyun Ahn...
SP
2002
IEEE
139views Security Privacy» more  SP 2002»
14 years 9 months ago
Mobile objects in Java
Mobile Objects in Java provides support for object mobility in Java. Similarly to the RMI technique, a notion of client-side stub, called startpoint, is used to communicate transp...
Luc Moreau, Daniel Ribbens