Filters








51,146 Hits in 3.8 sec

Protocols using anonymous connections: Mobile applications [chapter]

Michael G. Reed, Paul F. Syverson, David M. Goldschlag
1998 Lecture Notes in Computer Science  
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take encryption as primitive.  ...  This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption clari es and emphasizes high level security goals of key distribution protocols  ...  After sketching the requirements for a channel to be anonymous we use such c hannels to construct protocols for location protected mobile applications.  ... 
doi:10.1007/bfb0028156 fatcat:j53m4nmli5g7jpyeidbd2q65te

High Speed Network Anonymity Protocol Using Compression Based Face Change

Aparna S. Jaiswal
2018 Helix  
This FaceChange_id is used for communication in the network which enhances the data forwarding security.  ...  The short messages are send in Dissent protocol with use of HTTP API [2] .  ...  Throughput is calculated using the equation below and the test results are shown in Fig. 4 . (2) Conclusion In this paper, we propose High Speed Network Anonymity Protocol Using Compression Based Face  ... 
doi:10.29042/2018-3971-3975 fatcat:m6ld7mv635b2vkp33xhczo246q

Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol

Thomas Haakensen, Preetha Thulasiraman
2017 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)  
A tactical WSN has different priorities than a WSN used for civilian applications.  ...  OVERVIEW OF LOADNG ROUTING PROTOCOL The LOADng routing protocol is a reactive routing protocol developed for use in Mobile Ad hoc Networks (MANETs) and is currently a draft at the Internet Engineering  ... 
doi:10.1109/uemcon.2017.8249005 dblp:conf/uemcom/HaakensenT17 fatcat:jphysd7px5dczdyrl4aghrhkvu

An Improved User Anonymous Secure Authentication Protocol for Healthcare System Using Wireless Medical Sensor Network

M. F. Mridha, Md. Anwar Hussen Wadud, Md. Abdul Hamid, Md. Al Imran
2022 International Journal of Computing and Digital Systems  
An anonymous patient monitoring system using WMSN presented by Amin et al. and demanded that their system preserves mutual authentication, user anonymity and security against stolen smart device attacks  ...  Furthermore, in our proposed protocol we have used the BAN logic model to prove the correctness of the mutual authentication feature.  ...  Therefore, this protocol is resistant to replay attacks. G. Anonymity preservation This protocol preserves user anonymity because it uses masked identity MID u and masked password MPW u .  ... 
doi:10.12785/ijcds/110121 fatcat:ij6nlu6k2fb2lmqqheznqcweha

A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network

Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis
2014 Security and Communication Networks  
Considering the wide spread adoption of smartphones in mobile communications and the well established resource sharing use in the networking community, we present a novel mechanism to achieve anonymity  ...  We propose a Voice over Internet Protocol (VoIP) infrastructure using the Session Initiation Protocol (SIP) where a smartphone registers on a SIP Registrar and can start GSM conversation through another  ...  We focus on the Voice Over Internet Protocol (VoIP) and mobile communications and present a proof of concept for performing telephone calls on a mobile network with caller anonymity.  ... 
doi:10.1002/sec.995 fatcat:kt2xc74smbcgdf4dnilmcrxrau

Ubi-Interact: A modular approach to connecting systems

Sandro Weber, Marian Ludwig, Gudrun Klinker
2021 EAI Endorsed Transactions on Mobile Communications and Applications  
The framework is ready to be used. Nodes for CSharp, Javascript, C++ and Java exist and features are continuously expanded.  ...  Specification and implementation of such applications should be modular, extendable and reusable.  ...  [19] made performance comparisons for Flatbuffers, Protocol Buffers, JSON and BSON while Flatbuffers is also actively used by mobile game engines -a use-case that is definitely intensive in interaction  ... 
doi:10.4108/eai.14-7-2021.170291 fatcat:gjkfytbgpvhvpkfojddrn3zc74

Designing Privacy-Enhancing Mobile Applications [chapter]

Koen Decroix, Bart De Decker, Vincent Naessens
2012 IFIP Advances in Information and Communication Technology  
This paper evaluates the multi-paradigm modelling methodology for designing controlled anonymous applications, like applications that use trap-door anonymity.  ...  The methodology is applied to a class of mobile applications with strong security and privacy requirements.  ...  in mobile applications [2] .  ... 
doi:10.1007/978-3-642-31668-5_12 fatcat:xthvj2sb4rhunhjt5toubg2cr4

Characterizing mobile *-box applications

Xiapu Luo, Haocheng Zhou, Le Yu, Lei Xue, Yi Xie
2016 Computer Networks  
With the increasing use of multiple electronic devices including tablets, PCs, and mobile devices, Personal Cloud Storage (PCS) services, such as Dropbox and Box, have gained huge popularity.  ...  The mobile clients deserve a further study because the study of PC clients does not necessarily represent the system and network demand with mobile clients.  ...  Acknowledgment We thank the anonymous reviewers for their quality reviews and suggestions. We also thank Fufeng Chen, Guozhi Xue and Yun Lin (Xiamen University) for their helps in the experiments.  ... 
doi:10.1016/j.comnet.2016.03.025 fatcat:kdnejtzlkvaf3f3ev52eejjeji

De-anonymizing the internet using unreliable IDs

Yinglian Xie, Fang Yu, Martin Abadi
2009 Proceedings of the ACM SIGCOMM 2009 conference on Data communication - SIGCOMM '09  
Today's Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable.  ...  In this paper, we present a system called HostTracker that tracks dynamic bindings between hosts and IP addresses by leveraging application-level data with unreliable IDs.  ...  We are grateful to Mike Bidgoli, Cindy Cai, Hersh Dangayach, Jeff Davis, Eliot Gillum, Geoff Hulten, Linda McColm, Ivan Osipkov, Krish Vitaldevara, and Jason Walter for providing us with data and feedback  ... 
doi:10.1145/1592568.1592579 dblp:conf/sigcomm/XieYA09 fatcat:w55yuj2enrhdpbm5fyuzkdcmwq

Application-layer mobility using SIP

Henning Schulzrinne, Elin Wedlund
2000 ACM SIGMOBILE Mobile Computing and Communications Review  
Supporting mobile Internet multimedia applications requires more than just the ability to maintain connectivity across subnet changes.  ...  We also briefly discuss application-layer mobility for streaming multimedia applications initiated by RTSP. I.  ...  For many mobile client applications with short-lived connections, only DHCP is required.  ... 
doi:10.1145/372346.372369 fatcat:dpq7s5k6a5d7vprn32e7rbyscy

Enhancing vehicular internet connectivity using whitespaces, heterogeneity, and a scouting radio

Tan Zhang, Sayandeep Sen, Suman Banerjee
2014 Proceedings of the 12th annual international conference on Mobile systems, applications, and services - MobiSys '14  
We explore the use of TV whitespace communication systems for providing robust connectivity to vehicles.  ...  A key challenge in this setup is the asymmetry in transmit power limits -the fixed base station is allowed to communicate at up to 4 W, while the mobile gateways in vehicles are limited to 100 mW.  ...  We are grateful to our shepherd, Romit Roy Choudhury, and the anonymous reviewers whose comments helped bring the paper to its final form.  ... 
doi:10.1145/2594368.2594371 dblp:conf/mobisys/ZhangSB14 fatcat:uoycjxh3mfh6pco74yy67udilm

Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things using Physically Unclonable Functions

Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park
2019 IEEE Access  
protocols and applications (AVISPA)" and also non-mathematical (informal) security analysis have been carried out on the proposed scheme.  ...  In this paper, we present a novel lightweight anonymous user authentication protocol for the IoT environment by utilizing "cryptographic one-way hash function", "physically unclonable function (PUF)" and  ...  ACKNOWLEDGMENTS The authors thank the anonymous reviewers and the associate editor for their valuable feedback on the paper which helped us to improve its quality and presentation.  ... 
doi:10.1109/access.2019.2926578 fatcat:luyrpjgtkjcu5mpabahvwveulq

Innovative Mobile Internet Services and Applications

Ilsun You, Francesco Palmieri, Leonard Barolli
2015 Mobile Information Systems  
Acknowledgments We would like to express our sincere appreciation of the valuable contributions made by all the authors and our deep gratitude to all the highly qualified anonymous reviewers who have carefully  ...  In the new service environments empowered by mobile Internet connectivity Proxy Mobile IPv6 (PMIPv6) emerged as a promising network-based mobility management protocol, which does not need any participation  ...  In particular, the convergence of mobile communications technologies and ubiquitous Internet coverage is introducing alternative business models, together with new applications, devices services, protocols  ... 
doi:10.1155/2015/280275 fatcat:hc3sj2ghebhhrmrotfpyikwoke

Mobile Security and its Application

Jun Hou Chan, Jer Lang Hong
2016 International Journal of Security and Its Applications  
Hence what makes a smartphone is the mobile operating system that it is built upon, which is similar to a computer.  ...  Ownership of a smartphone has never been easier nowadays, and it is supported by the fact that most of the people around us have a smartphone or an equivalent smart device.  ...  Acknowledgements This paper is a revised and expanded version of a paper entitled "A survey on Mobile Security" presented at The 5th International Conference on Next Generation Computer and Information  ... 
doi:10.14257/ijsia.2016.10.10.10 fatcat:ydbv2wzhhra3bhxl4jrtvqpe3m

Engineering Wireless Mobile Applications

Qusay H. Mahmoud, Zakaria Maamar
2006 International Journal of Information Technology and Web Engineering  
Wireless mobile application development, on the other hand, is more challenging because applications are developed on one platform (like UNIX or Windows) and deployed on a totally different platform like  ...  What is unique about this approach is that it takes into account the special features of the new medium (mobile devices and wireless networks), the operational environment, and the multiplicity of user  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for the many helpful suggestions for improving this paper.  ... 
doi:10.4018/jitwe.2006010103 fatcat:6x6a2q3t2rbdffzrufmv5ycajm
« Previous Showing results 1 — 15 out of 51,146 results