Sciweavers

1030 search results - page 11 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
NETGAMES
2003
ACM
15 years 2 months ago
Mobility and stability evaluation in wireless multi-hop networks using multi-player games
Plenty of work was contributed in the field of protocol design and performance evaluation of multi-hop networks. It is generally accepted that mobility has a huge impact on the p...
Frank H. P. Fitzek, Leonardo Badia, Michele Zorzi,...
SIGCOMM
2009
ACM
15 years 4 months ago
A standalone content sharing application for spontaneous communities of mobile handhelds
This demo illustrates the benefits of BitHoc, a standalone protocol for content sharing among spontaneous communities of mobile handhelds using wireless multi-hop connections. Bi...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
PERCOM
2010
ACM
14 years 8 months ago
Service-based development of mobile real-time collaboration applications for Social Networks
—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
FC
2008
Springer
134views Cryptology» more  FC 2008»
14 years 11 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
IPPS
2007
IEEE
15 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...