Sciweavers

888 search results - page 58 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
JNW
2007
88views more  JNW 2007»
14 years 11 months ago
Resource Allocation Schemes in Integrated Heterogeneous Wireless and Mobile Networks
— Wireless and mobile networks have experienced a great success in the past few years. However, any single type of wireless and mobile network cannot meet all types of service re...
Wei Shen, Qing-An Zeng
SPW
2005
Springer
15 years 5 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 4 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
IADIS
2004
15 years 1 months ago
A mobile-aware business logic container
Currently providing such features in mobile applications as the sending of lower-bandwidth images when a client device is in a low-bandwidth access area, the business logic to dis...
Robert Steele, Elaine Lawrence
PET
2012
Springer
13 years 2 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter