Mobile Computing

Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage, which allows for transmission of data, voice and video. Mobile computing involves mobile communication, mobile hardware, and mobile software.

Pre Existing Routing

SUPERMAN: Security Using Pre Existing Routing for Mobile Ad hoc Networks

SUPERMAN: Security Using Pre Existing Routing for Mobile Ad hoc Networks Introduction : The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasing popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect …

SUPERMAN: Security Using Pre Existing Routing for Mobile Ad hoc Networks Read More »

Trajectories by Regions

Searching Trajectories by Regions of Interest

Searching Trajectories by Regions of Interest Introduction: With the increasing availability of moving-object tracking data, trajectory search is increasingly important. We propose and investigate a novel query type named trajectory search by regions of interest (TSR query). Given an argument set of trajectories, a TSR query takes a set of regions of interest as a …

Searching Trajectories by Regions of Interest Read More »

Quantifying Interdependent Privacy

Quantifying Interdependent Privacy Risks with Location Data

Quantifying Interdependent Privacy Risks with Location Data Introduction : Co-location information about users is increasingly available online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names of the friends they are with. The …

Quantifying Interdependent Privacy Risks with Location Data Read More »

Mobile Malicious Webpages

Detecting Mobile Malicious Webpages in Real Time

Detecting Mobile Malicious Webpages in Real Time Introduction : Mobile specific webpages differ significantly from their desktop counterparts in content, layout and functionality. Accordingly, existing techniques to detect malicious websites are unlikely to work for such webpages. In this paper, we design and implement kAYO, a mechanism that distinguishes between malicious and benign mobile webpages. …

Detecting Mobile Malicious Webpages in Real Time Read More »

Proxy based Collaboration System

A Proxy based Collaboration System to Minimize Content Download Time and Energy Consumption

A Proxy based Collaboration System to Minimize Content Download Time and Energy Consumption Introduction: Mobile collaborative community (MCC) is an emerging technology that allows multiple mobile nodes (MNs) to perform a resource intensive task, such as large content download, in a cooperative manner. In this paper, we introduce a proxy-based collaboration system for the MCC …

A Proxy based Collaboration System to Minimize Content Download Time and Energy Consumption Read More »