Sciweavers

745 search results - page 117 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 11 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
CCGRID
2001
IEEE
14 years 16 days ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw
COMPSAC
2009
IEEE
14 years 24 days ago
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Karim M. El Defrawy, John Solis, Gene Tsudik
EURONGI
2008
Springer
13 years 10 months ago
A Seamless Vertical Handover Approach
Abstract-- Wireless network devices are equipped with multiple access technologies like UMTS and Wireless LAN. The handover between the technologies has been widely studied in lite...
Rastin Pries, Dirk Staehle, Phuoc Tran-Gia, Thorst...
INFOCOM
2009
IEEE
14 years 3 months ago
RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc Networks
— This paper deals with the problem of reliable and fast broadcast of mission-critical data with rich content over ad hoc networks. Existing approaches to dissemination reliabili...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...