Sciweavers

745 search results - page 108 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
BROADNETS
2007
IEEE
15 years 1 months ago
SAABCOT: Secure application-agnostic bandwidth conservation techniques
Abstract-- High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the da...
Chad D. Mano, David Salyers, Qi Liao, Andrew Blaic...
WINET
2010
142views more  WINET 2010»
14 years 8 months ago
Demand-driven publish/subscribe in mobile environments
—We propose a novel Self-Balancing Supply/Demand (SBSD) reactive MANET protocol. Our algorithm dynamically discovers publications matching specified subscriptions by controlled f...
Aris M. Ouksel, Doug Lundquist
EEE
2004
IEEE
15 years 1 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar
INFOCOM
2012
IEEE
13 years 5 days ago
FemtoCaching: Wireless video content delivery through distributed caching helpers
Abstract—We suggest a novel approach to handle the ongoing explosive increase in the demand for video content in wireless/mobile devices. We envision femtocell-like base stations...
Negin Golrezaei, Karthikeyan Shanmugam, Alexandros...
CORR
2007
Springer
138views Education» more  CORR 2007»
14 years 9 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy