-
1
-
-
84875482468
-
Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption
-
M. Conti, D. Diodati, C. M. Pinotti, and B. Crispo, "Optimal solutions for pairing services on smartphones: a strategy to minimize energy consumption," in Proc. of IEEE CPSCom '12, 2012.
-
Proc. of IEEE CPSCom '12, 2012
-
-
Conti, M.1
Diodati, D.2
Pinotti, C.M.3
Crispo, B.4
-
2
-
-
84880163487
-
Maui: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "Maui: making smartphones last longer with code offload," in Proc. of MobiSys '10, 2010.
-
Proc. of MobiSys '10, 2010
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
3
-
-
84861596582
-
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
-
S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, "Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading." in Proc. of IEEE INFOCOM '12, 2012.
-
Proc. of IEEE INFOCOM '12, 2012
-
-
Kosta, S.1
Aucinas, A.2
Hui, P.3
Mortier, R.4
Zhang, X.5
-
4
-
-
85084163878
-
Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud
-
S. Kosta, C. Perta, J. Stefa, P. Hui, and A. Mei, "Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud," in Proc. of USENIX HotCloud '13, 2013.
-
Proc. of USENIX HotCloud '13, 2013
-
-
Kosta, S.1
Perta, C.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
5
-
-
84883128081
-
To Offload or Not to Offload? The Bandwidth and Energy Costs of Mobile Cloud Computing
-
M. V. Barbera, S. Kosta, A. Mei, and J. Stefa, "To Offload or Not to Offload? The Bandwidth and Energy Costs of Mobile Cloud Computing," in Proc. of IEEE INFOCOM '13, 2013.
-
Proc. of IEEE INFOCOM '13, 2013
-
-
Barbera, M.V.1
Kosta, S.2
Mei, A.3
Stefa, J.4
-
6
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H.Bos, "Paranoid android: versatile protection for smartphones," in Proc. of ACSAC '10, 2010.
-
Proc. of ACSAC '10, 2010
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
7
-
-
84870312066
-
CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud
-
M. V. Barbera, S. Kosta, J. Stefa, P. Hui, and A. Mei, "CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud," in Proc. of IEEE P2P '12, 2012.
-
Proc. of IEEE P2P '12, 2012
-
-
Barbera, M.V.1
Kosta, S.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
8
-
-
84927627458
-
CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones
-
S. Kosta, V. C. Perta, J. Stefa, P. Hui, and A. Mei, "CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones," in Proc. of IEEE INFOCOM 2013, 2013.
-
Proc. of IEEE INFOCOM 2013, 2013
-
-
Kosta, S.1
Perta, V.C.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
9
-
-
84891455911
-
Mobile tcp usage characteristics and the feasibility of network migration without infrastructure support
-
A. Rahmati, C. Shepard, A. Nicoara, L. Zhong, and P. Singh, "Mobile tcp usage characteristics and the feasibility of network migration without infrastructure support," in Proc. of ACM MobiCom ' 10, 2010.
-
Proc. of ACM MobiCom ' 10, 2010
-
-
Rahmati, A.1
Shepard, C.2
Nicoara, A.3
Zhong, L.4
Singh, P.5
-
11
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-90, 1981.
-
(1981)
Commun. ACM
, vol.24
, pp. 84-90
-
-
Chaum, L.1
-
12
-
-
70349657031
-
Rome: Performance and anonymity using route meshes
-
K. Puttaswamy, A. Sala, O. Egecioglu, and B. Zhao, "Rome: Performance and anonymity using route meshes," in Proc. of IEEE INFOCOM '09, 2009.
-
Proc. of IEEE INFOCOM '09, 2009
-
-
Puttaswamy, K.1
Sala, A.2
Egecioglu, O.3
Zhao, B.4
-
13
-
-
76749094667
-
Starclique: Guaranteeing user privacy in social networks against intersection attacks
-
K. Puttaswamy, A. Sala, and B. Zhao, "Starclique: guaranteeing user privacy in social networks against intersection attacks," in Proc. of CoNEXT '09, 2009.
-
Proc. of CoNEXT '09, 2009
-
-
Puttaswamy, K.1
Sala, A.2
Zhao, B.3
-
14
-
-
20544471574
-
Sdar: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
-
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "Sdar: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in Proc. of IEEE LCN '04, 2004.
-
Proc. of IEEE LCN '04, 2004
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
15
-
-
70350090613
-
ARM: Anonymous routing protocol for mobile ad hoc networks
-
S. Seys and B. Preneel, "ARM: anonymous routing protocol for mobile ad hoc networks," Int. J. Wire. Mob. Comput., vol. 3, pp. 145-155, 2009.
-
(2009)
Int. J. Wire. Mob. Comput.
, vol.3
, pp. 145-155
-
-
Seys, S.1
Preneel, B.2
-
16
-
-
33745945444
-
Anondsr: Efficient anonymous dynamic source routing for mobile ad-hoc networks
-
R. Song, L. Korba, and G. Yee, "Anondsr: efficient anonymous dynamic source routing for mobile ad-hoc networks," in Proc. of ACM SASN '05, 2005.
-
Proc. of ACM SASN '05, 2005
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
17
-
-
84871953737
-
Fan: Friendship based anonymous routing in wireless social mobile networks of malicious communities
-
A. Davoli, A. Mei, and J. Stefa, "Fan: friendship based anonymous routing in wireless social mobile networks of malicious communities," in Proc. of ExtremeCom '11, 2011.
-
Proc. of ExtremeCom '11, 2011
-
-
Davoli, A.1
Mei, A.2
Stefa, J.3
-
18
-
-
79951660476
-
Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme
-
R. Jansen and R. Beverly, "Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme," in Proc. of MILCOM '10, 2010.
-
Proc. of MILCOM '10, 2010
-
-
Jansen, R.1
Beverly, R.2
-
19
-
-
77955422013
-
Anti-localization anonymous routing for delay tolerant network
-
X. Lu, P. Hui, D. Towsley, J. Pu, and Z. Xiong, "Anti-localization anonymous routing for delay tolerant network," Computer Networks, vol. 54, no. 11, pp. 1899 - 1910, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.11
, pp. 1899-1910
-
-
Lu, X.1
Hui, P.2
Towsley, D.3
Pu, J.4
Xiong, Z.5
-
20
-
-
78049364161
-
Providing mobile users' anonymity in hybrid networks
-
C. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, "Providing mobile users' anonymity in hybrid networks," in Proc. of ESORICS '10, 2010.
-
Proc. of ESORICS '10, 2010
-
-
Ardagna, C.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
|