Sciweavers

1017 search results - page 184 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
MIR
2003
ACM
119views Multimedia» more  MIR 2003»
14 years 1 months ago
A wireless handheld multi-modal digital video library client system
We developed technologies for transmitting video contents over wireless platforms, and encapsulated these video delivery and presentation technologies into a client system for acc...
Michael R. Lyu, Jerome Yen, Edward Yau, Sam K. S. ...
CCS
2001
ACM
14 years 29 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
MOBIHOC
2009
ACM
14 years 9 months ago
Predict and relay: an efficient routing in disruption-tolerant networks
Routing is one of the most challenging open problems in disruption-tolerant networks (DTNs) because of the shortlived wireless connectivity environment. To deal with this issue, r...
Quan Yuan, Ionut Cardei, Jie Wu
MOBISYS
2007
ACM
14 years 8 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu