Sciweavers

1030 search results - page 89 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
WONS
2005
IEEE
15 years 9 months ago
Broadcasting in Hybrid Ad Hoc Networks
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular a...
François Ingelrest, David Simplot-Ryl, Ivan...
EUROCRYPT
2004
Springer
15 years 9 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
ICCSA
2005
Springer
15 years 9 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
KIVS
2005
Springer
15 years 9 months ago
Epidemic Dissemination of Presence Information in Mobile Instant Messaging Systems
This paper presents an approach for exchanging presence information between users of an instant messaging system in a mobile ad hoc network. As major feature, presence information ...
Christoph Lindemann, Oliver P. Waldhorst
MOBIDE
1999
ACM
15 years 8 months ago
Recovery Guarantees in Mobile Systems
Mobile applications increasingly require transaction-like properties, particularly those of recovery. Because there is a lack of abstractions to decompose the machinery of recover...
Cris Pedregal Martin, Krithi Ramamritham