Sciweavers

745 search results - page 27 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
14 years 2 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke
WWW
2001
ACM
14 years 9 months ago
Personalized Portal for Wireless Devices
Most of the content available on the Web today is not suitable for Wireless devices such as mobile phones or PDAs, which are characterized by small sized display, small memory, lo...
Kurt Maly, Mohammad Zubair
PERCOM
2009
ACM
14 years 3 months ago
A Middleware Service for Coordinated Adaptation of Communication Services in Groups of Devices
—Recent research in pervasive computing has shown that context-awareness and dynamic adaptation are fundamental requirements of mobile distributed applications. However, most app...
Jordan Janeiro, Thomas Springer, Markus Endler
ERSA
2010
115views Hardware» more  ERSA 2010»
13 years 6 months ago
Towards Adaptive Networking for Embedded Devices based on Reconfigurable Hardware
Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing...
Enno Lübbers, Marco Platzner, Christian Pless...
PERCOM
2007
ACM
14 years 8 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...