Sciweavers

888 search results - page 24 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
PERCOM
2010
ACM
14 years 9 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
CCS
2011
ACM
13 years 11 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
UIC
2007
Springer
15 years 5 months ago
Self-deployment of Mobile Nodes in Hybrid Sensor Networks by AHP
Abstract. The proper deployment of sensors is very important for the successful completion of the sensing tasks due to the inevitable relation with the physical world. This paper p...
Xiaoling Wu, Jinsung Cho, Brian J. d'Auriol, Sungy...
112
Voted
MONET
2007
160views more  MONET 2007»
14 years 11 months ago
Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks
Efficient routing and medium access control (MAC) are very important for Mobile Ad hoc Networks (MANETs). Most existing routing and MAC protocols consider homogeneous ad hoc networ...
Xiaojiang Du, Dapeng Wu
MOBISYS
2006
ACM
15 years 11 months ago
Efficient and transparent dynamic content updates for mobile clients
We introduce a novel infrastructure supporting automatic updates for dynamic content browsing on resource constrained mobile devices. Currently, the client is forced to continuous...
Trevor Armstrong, Olivier Trescases, Cristiana Amz...