Sciweavers

745 search results - page 47 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
USENIX
2003
13 years 10 months ago
In-Place Rsync: File Synchronization for Mobile and Wireless Devices
The open-source rsync utility reduces the time and bandwidth required to update a file across a network. Rsync uses an interactive protocol that detects changes in a file and se...
David Rasch, Randal C. Burns
CSFW
2000
IEEE
14 years 9 days ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
SIGCOMM
2009
ACM
14 years 3 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
ICDCS
1996
IEEE
14 years 26 days ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
ICNP
2006
IEEE
14 years 2 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...