Sciweavers

1030 search results - page 123 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
SPW
2005
Springer
15 years 9 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
WOA
2010
15 years 1 months ago
Towards a Flexible Development Framework for Multi-Agent Systems
In this paper, we present a software framework, called HDS (Heterogeneous Distributed System), that tries to simplify the realization of distributed applications and, in particular...
Agostino Poggi
NCA
2005
IEEE
15 years 9 months ago
A Wide Area Network Simulation of Single-Round Group Membership Algorithms
A recent theoretical result proposed Sigma, a novel GM protocol that forms views using a singleround of message exchange. Prior GM protocols have required more rounds in the worst...
Roger Khazan, Sophia Yuditskaya
HOTNETS
2010
14 years 10 months ago
"Extra-sensory perception" for wireless networks
Commodity smartphones and tablet devices now come equipped with a variety of sensors, including accelerometers, multiple positioning sensors, magnetic compasses, and inertial sens...
Lenin Ravindranath, Calvin C. Newport, Hari Balakr...
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz