Sciweavers

4205 search results - page 177 / 841
» Typed Mobile Objects
Sort
View
SACRYPT
2004
Springer
15 years 10 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
SIMUTOOLS
2008
15 years 6 months ago
Opportunistic networking in OMNeT++
This work describes mechanisms for simulating opportunistic and delay-tolerant networks in the OMNeT++ discrete event simulator. The mechanisms allow for simulating open systems o...
Ólafur Ragnar Helgason, Kristján Val...
JDCTA
2010
125views more  JDCTA 2010»
14 years 11 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
NSF
2001
Springer
197views Computer Vision» more  NSF 2001»
15 years 9 months ago
A Collaborative Infrastructure for Mobile and Wireless Systems
Today‘s use of mobile phones is mostly for coordination purposes. It seems reasonable to assume that 3G and 4G high bandwidth systems will be used in a similar way. This paper th...
Lutz Michael Wegner, Morad Ahmad, Stefan Fröh...
140
Voted
IPPS
2006
IEEE
15 years 10 months ago
Babylon v2.0: middleware for distributed, parallel, and mobile Java applications
Babylon v2.0 is a collection of tools and services that provide a 100% Java compatible environment for developing, running and managing parallel, distributed and mobile Java appli...
Willem van Heiningen, Tim Brecht, Steve MacDonald