Sciweavers

1030 search results - page 62 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
AINA
2008
IEEE
15 years 4 months ago
A Peer-to-Peer Approach for Mobile File Transfer in Opportunistic People Networks
With wireless technologies extending to every part of our daily lives, mobile networking applications are becoming increasingly popular for accessing the Internet. In this paper, ...
Ling-Jyh Chen, Ting-Kai Huang
IPPS
2002
IEEE
15 years 2 months ago
Disconnected Operations in Mobile Environments
The execution of distributed applications involving mobile terminals and fixed servers connected by wireless links raises the need for handling network disconnections, both invol...
Denis Conan, Sophie Chabridon, Guy Bernard
ESAS
2004
Springer
15 years 3 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
GLOBECOM
2006
IEEE
15 years 3 months ago
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
– Mobile Ad-hoc Networks (MANETs) are important in pervasive computing systems, in which users discover and utilize various services to achieve their goals. Integrating service d...
Stephen S. Yau, Wei Gao, Dazhi Huang
WS
2004
ACM
15 years 3 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...