Sciweavers

745 search results - page 102 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
TPDS
2008
133views more  TPDS 2008»
13 years 8 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
MOBISYS
2010
ACM
13 years 11 months ago
Characterizing the transport behaviour of the short message service
We build an efficient and reliable data transport protocol on top of the Short Message Service (SMS). We conduct a series of experiments to characterize SMS behaviour under bursty...
Earl Oliver
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 10 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
SUTC
2006
IEEE
14 years 2 months ago
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang
GLOBECOM
2006
IEEE
14 years 2 months ago
Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...