Sciweavers

29 search results - page 4 / 6
» TCP Meets Mobile Code
Sort
View
ESORICS
2007
Springer
14 years 5 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
JNCA
2010
106views more  JNCA 2010»
13 years 9 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...
COMCOM
2000
82views more  COMCOM 2000»
13 years 10 months ago
Soft handoff in a CDMA wireless ATM environment
Future wireless asynchronous transfer mode (ATM) networks present a number of mobility related challenges. Handoffs due to user mobility require network signaling to maintain the ...
Steven Lombardi, Weihua Zhuang
EUC
2005
Springer
14 years 4 months ago
Realtime H.264 Encoding System Using Fast Motion Estimation and Mode Decision
Abstract. H.264 provides various useful features such as improved coding efficiency and error robustness. These features enable mobile device to adopt H.264/AVC standard to achieve...
Byeong-Doo Choi, Min-Cheol Hwang, Jun-Ki Cho, Jin-...
SCN
2010
Springer
143views Communications» more  SCN 2010»
13 years 9 months ago
History-Free Aggregate Message Authentication Codes
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
Oliver Eikemeier, Marc Fischlin, Jens-Fabian G&oum...