Sciweavers

1030 search results - page 18 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
PDCAT
2004
Springer
15 years 3 months ago
UbiqStor: A Remote Storage Service for Mobile Devices
In Ubiquitous computing environment the mobile devices such as PDAs necessarily connect to remote storage servers. We present an iSCSI caching system that localizes iSCSI target to...
MinHwan Ok, Daegeun Kim, Myong-Soon Park
IFIP
2004
Springer
15 years 3 months ago
Service Location and Multiparty Peering for Mobile Ad Hoc Communication
Abstract. Flexible personal communications may require dynamically discovering, using, and combining a number of services to support the activities of a mobile user. However, many ...
Dirk Kutscher, Jörg Ott
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 1 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
ICWMC
2006
IEEE
15 years 3 months ago
An Ant-based Routing Protocol using Unidirectional Links for Heterogeneous Mobile Ad-Hoc Networks
Because of the heterogeneity in radio transceiver capabilities and influence of surroundings, unidirectional links arise in wireless mobile ad-hoc networks. Since most of existin...
Taro Maekawa, Harumasa Tada, Naoki Wakamiya, Makot...
ICNP
2007
IEEE
15 years 3 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik