Sciweavers

485 search results - page 83 / 97
» Key technologies for the next generation wireless communicat...
Sort
View
CSFW
2012
IEEE
13 years 6 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
CN
2010
120views more  CN 2010»
14 years 10 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan
SASO
2008
IEEE
15 years 4 months ago
Social Networking for Pervasive Adaptation
As technology progresses, we are seeing increasing numbers of small devices that have the capability to store, process and forward information in our everyday physical environment...
Stuart M. Allen, Marco Conti, Jon Crowcroft, Robin...
PERCOM
2009
ACM
15 years 10 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
MOBISYS
2008
ACM
15 years 9 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park