: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern application...
In this paper we present MoCha-π, an exogenous coordination calculus that is based on mobile channels. A mobile channel is a coordination primitive that allows anonymous point-to...
Juan Guillen Scholten, Farhad Arbab, Frank S. de B...
We explore the use of Bluetooth friendly names within the mobile space. Each Bluetooth-enabled device possesses a short string known as a ‘friendly name’ used to help identify...
Barry Lavelle, Daragh Byrne, Gareth J. F. Jones, A...