-
1
-
-
84875482468
-
Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption
-
M. Conti, D. Diodati, C.M. Pinotti, and B. Crispo, "Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption, " Proc. IEEE Int'l Conf. Cyber, Physical and Social Computing (CPSCom '12), 2012.
-
(2012)
Proc. IEEE Int'l Conf. Cyber, Physical and Social Computing (CPSCom '12)
-
-
Conti, M.1
Diodati, D.2
Pinotti, C.M.3
Crispo, B.4
-
2
-
-
77954993714
-
MAUI: Making smartphones last longer with code Offload
-
E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "MAUI: Making Smartphones Last Longer with Code Offload, " Proc. ACM Eighth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '10), 2010.
-
(2010)
Proc. ACM Eighth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '10)
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
3
-
-
84861596582
-
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
-
S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, "Thinkair: Dynamic Resource Allocation and Parallel Execution in the Cloud for Mobile Code Offloading, " Proc. IEEE INFOCOM '12, 2012.
-
(2012)
Proc. IEEE INFOCOM
, pp. 12
-
-
Kosta, S.1
Aucinas, A.2
Hui, P.3
Mortier, R.4
Zhang, X.5
-
4
-
-
85084163878
-
Clone2Clone (C2C): Peer-to-peer networking of smartphones on the cloud
-
S. Kosta, C. Perta, J. Stefa, P. Hui, and A. Mei, "Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud, " Proc. USENIX HotCloud '13, 2013.
-
(2013)
Proc. USENIX HotCloud
, pp. 13
-
-
Kosta, S.1
Perta, C.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
5
-
-
84883128081
-
To offload or not to Offload? the bandwidth and energy costs of mobile cloud computing
-
M.V. Barbera, S. Kosta, A. Mei, and J. Stefa, "To Offload or Not to Offload? The Bandwidth and Energy Costs of Mobile Cloud Computing, " Proc. IEEE INFOCOM '13, 2013.
-
(2013)
Proc. IEEE INFOCOM
, pp. 13
-
-
Barbera, M.V.1
Kosta, S.2
Mei, A.3
Stefa, J.4
-
6
-
-
84927663654
-
CDroid: Towards a cloud-integrated mobile operating system
-
M.V. Barbera, S. Kosta, A. Mei, V.C. Perta, and J. Stefa, "CDroid: Towards a Cloud-Integrated Mobile Operating System, " Proc. IEEE INFOCOM '13, 2013.
-
(2013)
Proc. IEEE INFOCOM
, pp. 13
-
-
Barbera, M.V.1
Kosta, S.2
Mei, A.3
Perta, V.C.4
Stefa, J.5
-
7
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid Android: Versatile Protection for Smartphones, " Proc. 26th Ann. Computer Security Applications Conf. (ACSAC '10), 2010.
-
(2010)
Proc. 26th Ann. Computer Security Applications Conf. (ACSAC '10)
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
8
-
-
84904431134
-
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system
-
M.V. Barbera, S. Kosta, A. Mei, V.C. Perta, and J. Stefa, "Mobile Offloading in the Wild: Findings and Lessons Learned through a Real-life Experiment with a New Cloud-aware System, " Proc. IEEE INFOCOM '14, 2014.
-
(2014)
Proc. IEEE INFOCOM
, pp. 14
-
-
Barbera, M.V.1
Kosta, S.2
Mei, A.3
Perta, V.C.4
Stefa, J.5
-
9
-
-
84870312066
-
Cloud Shield: Efficient anti-malware smartphone patching with a P2P network on the cloud
-
M.V. Barbera, S. Kosta, J. Stefa, P. Hui, and A. Mei, "CloudShield: Efficient Anti-Malware Smartphone Patching with a P2P Network on the Cloud, " Proc. IEEE 12th Int'l Conf. Per-to-Peer Computing (P2P '12), 2012.
-
(2012)
Proc. IEEE 12th Int'l Conf. Per-to-Peer Computing (P2P '12)
-
-
Barbera, M.V.1
Kosta, S.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
10
-
-
84927627458
-
Clone Doc: Exploiting the cloud to leverage secure group collaboration mechanisms for smartphones
-
S. Kosta, V.C. Perta, J. Stefa, P. Hui, and A. Mei, "CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones, " Proc. IEEE INFOCOM '13, 2013.
-
(2013)
Proc. IEEE INFOCOM
, pp. 13
-
-
Kosta, S.1
Perta, V.C.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
11
-
-
70349132697
-
Privacy preservation over untrusted mobile networks
-
Springer
-
C. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, "Privacy Preservation over Untrusted Mobile Networks, " Privacy in Location Based Applications: Research Issues and Emerging Trends, pp. 84-105, Springer, 2009.
-
(2009)
Privacy in Location Based Applications: Research Issues and Emerging Trends
, pp. 84-105
-
-
Ardagna, C.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
-
12
-
-
84891455911
-
Mobile TCP usage characteristics and the feasibility of network migration without infrastructure support
-
A. Rahmati, C. Shepard, A. Nicoara, L. Zhong, and P. Singh, "Mobile TCP Usage Characteristics and the Feasibility of Network Migration without Infrastructure Support, " Proc. ACM MobiCom '10, 2010.
-
(2010)
Proc. ACM MobiCom
, pp. 10
-
-
Rahmati, A.1
Shepard, C.2
Nicoara, A.3
Zhong, L.4
Singh, P.5
-
14
-
-
84891384442
-
Preserving smartphone users' anonymity in cloudy days
-
C. Ardagna, M. Conti, M. Leone, and J. Stefa, "Preserving Smartphone Users' Anonymity in Cloudy Days, " Proc. Workshop Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST '13), 2013.
-
(2013)
Proc. Workshop Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST '13)
-
-
Ardagna, C.1
Conti, M.2
Leone, M.3
Stefa, J.4
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, " Comm. ACM, vol. 24, pp. 84-90, 1981.
-
(1981)
Comm. ACM
, vol.24
, pp. 84-90
-
-
Chaum, L.1
-
16
-
-
70349657031
-
Rome: Performance and anonymity using route meshes
-
K. Puttaswamy, A. Sala, O. Egecioglu, and B. Zhao, "Rome: Performance and Anonymity using Route Meshes, " Proc. IEEE INFOCOM '09, 2009.
-
(2009)
Proc. IEEE INFOCOM '09
-
-
Puttaswamy, K.1
Sala, A.2
Egecioglu, O.3
Zhao, B.4
-
20
-
-
84877954096
-
Trustworthy distributed computing on social networks
-
A. Mohaisen, H. Tran, A. Chandra, and Y. Kim, "Trustworthy Distributed Computing on Social Networks, " Proc. Eighth ACM SIGSAC Symp. Information, Computer and Comm. Security (ASIACCS '13), 2013.
-
(2013)
Proc. Eighth ACM SIGSAC Symp. Information, Computer and Comm. Security (ASIACCS '13)
-
-
Mohaisen, A.1
Tran, H.2
Chandra, A.3
Kim, Y.4
-
21
-
-
70350090613
-
ARM: Anonymous routing protocol for mobile ad hoc networks
-
S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks, " Int'l J. Wireless and Mobile Computing, vol. 3, pp. 145-155, 2009.
-
(2009)
Int'l J. Wireless and Mobile Computing
, vol.3
, pp. 145-155
-
-
Seys, S.1
Preneel, B.2
-
22
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
Sept.
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks, " IEEE Trans. Wireless Computing, vol. 21, no. 9, pp. 2376-2385, Sept. 2006.
-
(2006)
IEEE Trans. Wireless Computing
, vol.21
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
24
-
-
77955422013
-
Anti-localization anonymous routing for delay tolerant network
-
X. Lu, P. Hui, D. Towsley, J. Pu, and Z. Xiong, "Anti-Localization Anonymous Routing for Delay Tolerant Network, " Computer Networks, vol. 54, no. 11, pp. 1899-1910, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.11
, pp. 1899-1910
-
-
Lu, X.1
Hui, P.2
Towsley, D.3
Pu, J.4
Xiong, Z.5
-
25
-
-
84878595251
-
Providing users' anonymity in mobile hybrid networks
-
C. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, "Providing Users' Anonymity in Mobile Hybrid Networks, " ACM Trans. Internet Technology, vol. 12, pp. 1-33, 2013.
-
(2013)
ACM Trans. Internet Technology
, vol.12
, pp. 1-33
-
-
Ardagna, C.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
-
26
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
B.G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, "Clonecloud: Elastic Execution between Mobile Device and Cloud, " Proc. Sixth Conf. Computer Systems (EuroSys '11), 2011.
-
(2011)
Proc. Sixth Conf. Computer Systems (EuroSys '11)
-
-
Chun, B.G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
27
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Nov./Dec.
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release, " IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001.
-
(2001)
IEEE Trans. Knowledge and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
28
-
-
0016643763
-
Packet switching in radio channels, Part II-The Hidden Terminal problem in carrier sense multiple access and the busy tone solution
-
Dec.
-
L. Kleinrock and F. Tobagi, "Packet Switching in Radio Channels, Part II-the Hidden Terminal Problem in Carrier Sense Multiple Access and the Busy Tone Solution, " IEEE Trans. Computers, vol. COM-23, no. 12, pp. 1417-1433, Dec. 1975.
-
(1975)
IEEE Trans. Computers
, vol.COM-23
, Issue.12
, pp. 1417-1433
-
-
Kleinrock, L.1
Tobagi, F.2
-
29
-
-
79952988817
-
Map-based location and tracking in multipath outdoor mobile networks
-
Mar.
-
M. Anisetti, C. Ardagna, V. Bellandi, E. Damiani, and S. Reale, "Map-Based Location and Tracking in Multipath Outdoor Mobile Networks, " IEEE Trans. Wireless Comm., vol. 10, no. 3, pp. 814-824, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Comm.
, vol.10
, Issue.3
, pp. 814-824
-
-
Anisetti, M.1
Ardagna, C.2
Bellandi, V.3
Damiani, E.4
Reale, S.5
-
30
-
-
33745798251
-
Timing attacks in low-latency mix systems (extended abstract)
-
B. Levine, M. Reiter, C. Wang, and M. Wright, "Timing Attacks in Low-Latency Mix Systems (Extended Abstract), " Proc. Int'l Conf. Financial Cryptography (FC '04), 2004.
-
(2004)
Proc. Int'l Conf. Financial Cryptography (FC '04)
-
-
Levine, B.1
Reiter, M.2
Wang, C.3
Wright, M.4
-
31
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
M. Wright, M. Adler, B.N. Levine, and C. Shields, "The Predecessor Attack: An Analysis of a threat to Anonymous Communications Systems, " ACM Trans. Information and System Security, vol. 7, no. 4, pp. 489-522, 2004.
-
(2004)
ACM Trans. Information and System Security
, vol.7
, Issue.4
, pp. 489-522
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
32
-
-
84861139529
-
Give2Get: Forwarding in social mobile wireless networks of selfish individuals
-
July
-
A. Mei and J. Stefa, "Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals, " IEEE Trans. Dependable and Secure Computing, vol. 9, no. 4, pp. 569-582, July 2012.
-
(2012)
IEEE Trans. Dependable and Secure Computing
, vol.9
, Issue.4
, pp. 569-582
-
-
Mei, A.1
Stefa, J.2
-
33
-
-
25844488399
-
Enforcing service availability in mobile ad-hoc WANs
-
L. Buttyan and J.-P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc WANs, " Proc. ACM MobiHoc '00, 2000.
-
(2000)
Proc. ACM MobiHoc '00
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
35
-
-
84860870225
-
Who killed my Battery?: Analyzing mobile browser energy consumption
-
N. Thiagarajan, G. Aggarwal, A. Nicoara, D. Boneh, and J. Singh, "Who Killed My Battery?: Analyzing Mobile Browser Energy Consumption, " Proc. 21st Int'l Conf. World Wide Web (WWW '12), 2012.
-
(2012)
Proc. 21st Int'l Conf. World Wide Web (WWW '12)
-
-
Thiagarajan, N.1
Aggarwal, G.2
Nicoara, A.3
Boneh, D.4
Singh, J.5
|