We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones withi...
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
The growing diffusion of wireless-enabled portable devices and the recent advances in Mobile Ad-hoc NETworks (MANETs) open a new scenario where users can benefit from anywhere/any...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
—The popularity of mobile devices and their increased computing power has given rise to surge in mobile computing technologies. Users are increasingly turning to mobile devices f...
Jill Freyne, Adam J. Brennan, Barry Smyth, Daragh ...
Augmented reality and group communication in wireless ad-hoc networks form relatively new fields of research. When using group communication ordering and timeliness requirements ...