Sciweavers

1631 search results - page 91 / 327
» Mobility Management
Sort
View
ESORICS
2010
Springer
15 years 1 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
104
Voted
INFOCOM
1999
IEEE
15 years 5 months ago
Enhancing Survivability of Mobile Internet Access Using Mobile IP with Location Registers
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
158
Voted
JSW
2008
196views more  JSW 2008»
15 years 18 days ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
131
Voted
TMM
2010
178views Management» more  TMM 2010»
14 years 7 months ago
A Lightweight SCTP for Partially Reliable Overlay Video Multicast Service for Mobile Terminals
Abstract--In this article, a video multicast protocol for multihomed mobile terminals is proposed as an alternative stream control transmission protocol (SCTP) for partially reliab...
Jinsuk Baek, Paul S. Fisher, Minho Jo, Hsiao-Hwa C...
120
Voted
COOPIS
2004
IEEE
15 years 4 months ago
Satin: A Component Model for Mobile Self Organisation
Abstract. We have recently witnessed a growing interest in self organising systems, both in research and in practice. These systems re-organise in response to new or changing condi...
Stefanos Zachariadis, Cecilia Mascolo, Wolfgang Em...