Sciweavers

1030 search results - page 28 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
HUC
2007
Springer
15 years 3 months ago
Haggle: Seamless Networking for Mobile Applications
This paper presents Haggle, an architecture for mobile devices that enables seamless network connectivity and application functionality in dynamic mobile environments. Current appl...
Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal...
97
Voted
JMM
2007
107views more  JMM 2007»
14 years 9 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
ACISP
2007
Springer
15 years 1 months ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
INFOCOM
1999
IEEE
15 years 1 months ago
Enhancing Survivability of Mobile Internet Access Using Mobile IP with Location Registers
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
IPPS
2008
IEEE
15 years 4 months ago
Middleware support for delay-tolerant service provision in disconnected mobile ad hoc networks
The service-oriented approach is known to be adequate for building distributed applications for mobile ad hoc networks, and a number of successful research works using this approa...
Yves Mahéo, Romeo Said, Frédé...