Sciweavers

1030 search results - page 7 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
CCS
2009
ACM
15 years 10 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria
WCNC
2008
IEEE
15 years 4 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
INFOCOM
2003
IEEE
15 years 2 months ago
IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks
— A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure. Since not many MANETs are curren...
Fan Bai, Narayanan Sadagopan, Ahmed Helmy
MOBICOM
2004
ACM
15 years 3 months ago
A study on the feasibility of mobile gateways for vehicular ad-hoc networks
Development in Wireless LAN and Cellular technologies has motivated recent efforts to integrate the two. This creates new application scenarios that were not possible before. Veh...
Vinod Namboodiri, Manish Agarwal, Lixin Gao
ICC
2008
IEEE
166views Communications» more  ICC 2008»
15 years 4 months ago
Multi-Initiator Connected Dominating Set Construction for Mobile Ad Hoc Networks
— The connected dominating set (CDS) has been extensively used for routing and broadcast in mobile ad hoc networks. While existing CDS protocols are successful in constructing CD...
Kazuya Sakai, Fangyang Shen, Kyoung Min Kim, Min-T...