Sciweavers

1030 search results - page 80 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
APNOMS
2006
Springer
15 years 7 months ago
A Zeroconf Approach to Secure and Easy-to-Use Remote Access to Networked Appliances
In this paper, we propose a new approach to secure and easy-to-use remote access to networked appliances (NAs). Based on the proposed approach, we develop a system in which servers...
Kiyohito Yoshihara, Toru Maruta, Hiroki Horiuchi
ATAL
2005
Springer
15 years 9 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh
ACSW
2006
15 years 5 months ago
Formal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment p...
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
AINA
2008
IEEE
15 years 10 months ago
Parameterless Broadcasting in Static to Highly Mobile Wireless Ad Hoc, Sensor and Actuator Networks
—In a broadcasting task, source node wants to send the same message to all the other nodes in the network. Existing solutions range from connected dominating set (CDS) based for ...
Adnan Afsar Khan, Ivan Stojmenovic, Nejib Zaguia
MMNS
2004
81views Multimedia» more  MMNS 2004»
15 years 5 months ago
Providing Seamless Mobility with Competition based Soft Handover Management
As host mobility and radio interference in wireless networks cause packet losses and delays, it is difficult to develop useful mobile real-time media applications. This paper descr...
Johan Kristiansson, Peter Parnes