Sciweavers

1030 search results - page 29 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
CORR
2004
Springer
106views Education» more  CORR 2004»
14 years 9 months ago
Roaming Real-Time Applications - Mobility Services in IPv6 Networks
Emerging mobility standards within the next generation Internet Protocol, IPv6, promise to continuously operate devices roaming between IP networks. Associated with the paradigm o...
Thomas C. Schmidt, Matthias Wählisch
USITS
2001
14 years 11 months ago
Fine-Grained Failover Using Connection Migration
This paper presents a set of techniques for providing fine-grained failover of long-running connections across a distributed collection of replica servers, and is especially usefu...
Alex C. Snoeren, David G. Andersen, Hari Balakrish...
CSFW
2012
IEEE
13 years 2 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
MOBICOM
2005
ACM
15 years 3 months ago
Design of vehicle network: mobile gateway for MANET and NEMO converged communication
There are several technologies to connect vehicles to networks and the Internet such as Network Mobility (NEMO) and Mobile Ad-hoc Networks (MANET). We investigate the use of both ...
Ryuji Wakikawa, Kouji Okada, Rajeev Koodli, Anders...
111
Voted
ENTCS
2007
131views more  ENTCS 2007»
14 years 9 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo