Sciweavers

745 search results - page 104 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ICC
2007
IEEE
117views Communications» more  ICC 2007»
14 years 3 months ago
Price Negotiation Systems for M-commerce
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Huafei Zhu, Feng Bao, A. Lakshminarayanan
ACSC
2004
IEEE
14 years 18 days ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
WISTP
2007
Springer
14 years 2 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette
LCN
2002
IEEE
14 years 1 months ago
Global Mobile IPv6 Addressing Using Transition Mechanisms
The adoption of the IPv4 protocol in wireless technologies has considerably increased the number of hosts that can potentially access the global Internet. The pressure for more IP...
Edgard Jamhour, Simone Storoz
SIGCOMM
2010
ACM
13 years 9 months ago
Experimenting with multipath TCP
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...
Sébastien Barré, Olivier Bonaventure...