Sciweavers

1030 search results - page 68 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
IEEEIAS
2008
IEEE
15 years 4 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
15 years 3 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke
COMPSAC
2005
IEEE
15 years 3 months ago
Exception Handling in Coordination-Based Mobile Environments
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern application...
Alexei Iliasov, Alexander B. Romanovsky
SAC
2005
ACM
15 years 3 months ago
MoCha-pi, an exogenous coordination calculus based on mobile channels
In this paper we present MoCha-π, an exogenous coordination calculus that is based on mobile channels. A mobile channel is a coordination primitive that allows anonymous point-to...
Juan Guillen Scholten, Farhad Arbab, Frank S. de B...
BCSHCI
2007
14 years 11 months ago
Bluetooth friendly names: bringing classic HCI questions into the mobile space
We explore the use of Bluetooth friendly names within the mobile space. Each Bluetooth-enabled device possesses a short string known as a ‘friendly name’ used to help identify...
Barry Lavelle, Daragh Byrne, Gareth J. F. Jones, A...