Sciweavers

1030 search results - page 86 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
MMS
2007
15 years 5 months ago
An Experimental Frame for Evaluating Service Trading Overlays in Mobile ad-hoc Networks
Abstract: For evaluating dynamics of mobile ad-hoc networks at least three different layers have to be distinguished: the application layer, the protocol layer, and the network lay...
Mathias Röhl, Adelinde M. Uhrmacher, Birgitta...
ITCC
2005
IEEE
15 years 9 months ago
A Mobile Commerce Framework Based on Web Services Architecture
“Mobile Internet” arguably means more than just a new technique for communication; many analysts believe that it will revolutionize the business world and innovate the way ind...
Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng
INFOCOM
2010
IEEE
15 years 2 months ago
Channel-based Unidirectional Stream Protocol (CUSP)
—This paper presents a novel transport protocol, CUSP, specifically designed with complex and dynamic network applications in mind. Peer-to-peer applications benefit in particu...
Wesley W. Terpstra, Christof Leng, Max Lehn, Aleja...
SACRYPT
2004
Springer
15 years 9 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
140
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Content-Based Routing in Mobile Ad Hoc Networks
The publish/subscribe model of communication provides sender/receiver decoupling and selective information dissemination that is appropriate for mobile environments characterized ...
Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacob...