Sciweavers

1030 search results - page 23 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
97
Voted
CCS
2007
ACM
15 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
GLOBECOM
2006
IEEE
15 years 3 months ago
Hierarchical Location Management for Transport Layer Mobility
— IP mobility can be handled at different layers of the protocol stack. Mobile IP has been developed to handle mobility of Internet hosts at the network layer. As an alternative ...
Shaojian Fu, Mohammed Atiquzzaman
76
Voted
PERCOM
2008
ACM
15 years 9 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 3 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
CAISE
2006
Springer
15 years 1 months ago
Aligning Software Architectures of Mobile Applications on Business Requirements
The support of mobile workers with mobile IT solutions can create dremendous improvements in mobile business processes of a company. The main charateristic of such a mobile system ...
Volker Gruhn, André Köhler