Sciweavers

646 search results - page 31 / 130
» Sharing multiple messages over mobile networks
Sort
View
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 8 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
MASS
2010
353views Communications» more  MASS 2010»
13 years 3 months ago
Trailing mobile sinks: A proactive data reporting protocol for Wireless Sensor Networks
In Wireless Sensor Networks (WSN), data gathering using mobile sinks typically incurs constant propagation of sink location indication messages to guide the direction of data repor...
Xinxin Liu, Han Zhao, Xin Yang, Xiaolin Li, Ning W...
MSN
2005
Springer
14 years 2 months ago
Dual Binding Update with Additional Care of Address in Network Mobility
In this paper, we propose an end-to-end route optimization scheme for nested mobile networks, which we refer to as Dual Binding Update (DBU ). In general, the nested mobile network...
Kwang Chul Jeong, Tae-Jin Lee, Hyunseung Choo
ICWN
2003
13 years 10 months ago
Adapting Content for Mobile Devices in Heterogeneous Collaboration Environments
The portability of new miniaturized devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Recent advances ...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox
ITNG
2008
IEEE
14 years 3 months ago
Mobile Voice Access in Social Networking Systems
This paper presents a multimodal social networking system aimed at sharing geographic information among proximate users. The system provides users with a traditional web-based int...
Stan Kurkovsky, David Strimple, Eric Nuzzi, Kerry ...