Sciweavers

1030 search results - page 12 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
Fundamental Mobility Properties for Realistic Performance Analysis of Intermittently Connected Mobile Networks
Traditional mobile ad hoc routing protocols fail to deliver any data in Intermittently Connected Mobile Ad Hoc Networks (ICMN's) because of the absence of complete end-to-end ...
Apoorva Jindal, Konstantinos Psounis
JNSM
2002
218views more  JNSM 2002»
14 years 9 months ago
An Agent-based Connection Management Protocol for Ad Hoc Wireless Networks
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
WPES
2003
ACM
15 years 2 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 4 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
JSW
2008
121views more  JSW 2008»
14 years 9 months ago
The Comparison of WML, cHTML, and XHTML-MP in m-Commerce
In order to use mobile devices for business application, mobile applications and standard have grown fast
Jongwook Woo, MinSeok Jang