Sciweavers

1030 search results - page 26 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
ICIW
2007
IEEE
15 years 4 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
ACISP
2004
Springer
15 years 3 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
INDOCRYPT
2001
Springer
15 years 2 months ago
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
We propose a new anonymous fingerprinting scheme using Okamoto-Uchiyama cryptosystem[1]. In the previous schemes[2]-[4] the enciphering rate is so small that it seems very difficu...
Minoru Kuribayashi, Hatsukazu Tanaka
MOBISYS
2005
ACM
15 years 9 months ago
Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts
Multi-homed mobile hosts situated in physical proximity may spontaneously team up to run high-bandwidth applications by pooling their low wireless wide-area network (WWAN) bandwid...
Kyu-Han Kim, Kang G. Shin
ACSD
2010
IEEE
220views Hardware» more  ACSD 2010»
14 years 7 months ago
Towards Performance Evaluation of Mobile Ad Hoc Network Protocols
We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network...
Fatemeh Ghassemi, Ali Movaghar, Wan Fokkink