Abstract. We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their ...
This paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy-based architecture that supports disconnected operation by r...
In this paper, we study the inconsistency problem in data broadcast. While data items in a mobile computing system are being broadcast, update transactions may install new values ...
This paper addresses the problem of geocasting in mobile ad hoc network (MANET) environments. Geocasting is a variant of the conventional multicasting problem. For multicasting, c...
In this paper we propose a new protocol for reliable multicast in a multi-hop mobile radio network. The protocol is reliable, i.e., it guarantees message delivery to all multicast...
In this study we investigate the interaction between TCP and MAC layer in a wireless multi-hop network. Using simulation, we provide new insight into two critical problems of TCP ...
This paper describes work carried out as part of the GUIDE project at Lancaster University. The overall aim of the project is to develop a context-sensitive tourist guide for visi...
Nigel Davies, Keith Cheverst, Keith Mitchell, Adri...
Current groupware systems do not work well over wireless networks, as a wireless connection is of variable and often poor quality. Our research suggests a number of changes that a...