Public key encryption with keyword search

D Boneh, G Di Crescenzo, R Ostrovsky… - … conference on the theory …, 2004 - Springer
We study the problem of searching on data that is encrypted using a public key system.
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …

[SÁCH][B] Industrial communication technology handbook

R Zurawski - 2014 - books.google.com
Featuring contributions from major technology vendors, industry consortia, and government
and private research establishments, the Industrial Communication Technology Handbook …

People, places, things: Web presence for the real world

T Kindberg, J Barton, J Morgan, G Becker… - Mobile Networks and …, 2002 - Springer
The convergence of Web technology, wireless networks, and portable client devices
provides new design opportunities for computer/communications systems. In the HP …

Cloud-based device information storage

N Ganapathy, EE Greeff - US Patent 8,943,551, 2015 - Google Patents
Device information for each of multiple devices associated with a user account is maintained
by a cloud service. The device information can include credential information allow ing the …

Maintaining real-time conversations over unreliable connections

R Ramanathan, P Samdadiya - US Patent 7,650,384, 2010 - Google Patents
BACKGROUND Users of computing devices (eg, laptops, cellular phones, and personal
digital assistants) often need to communicate in real time. A common form of real-time …

Public key encryption with searchable keywords based on Jacobi symbols

G Di Crescenzo, V Saraswat - International conference on cryptology in …, 2007 - Springer
Public-key encryption schemes with searchable keywords are useful to delegate searching
capabilities on encrypted data to a third party, who does not hold the entire secret key, but …

Autonomous gossi**: A self-organizing epidemic algorithm for selective information dissemination in wireless mobile ad-hoc networks

A Datta, S Quarteroni, K Aberer - … on Semantics for the Networked World, 2004 - Springer
We introduce autonomous gossi** (A/G), a new genre epidemic algorithm for selective
dissemination of information in contrast to previous usage of epidemic algorithms which …

The design and applications of a context service

H Lei, DM Sow, JS Davis, G Banavar… - ACM SIGMOBILE Mobile …, 2002 - dl.acm.org
Context awareness enables applications to adapt themselves to their computing
environment in order to better suit the needs of the user and the tasks. This paper describes …

Call management for location-aware mobile devices

V Vendrow, V Shmunis - US Patent 8,600,391, 2013 - Google Patents
(57) ABSTRACT A positioning system (eg, GPS) integrated in, or coupled to, a mobile device
determines the position of the mobile device. An availability status manager (ASM) in a …

Host mobility using an internet indirection infrastructure

S Zhuang, K Lai, I Stoica, R Katz… - Proceedings of the 1st …, 2003 - dl.acm.org
Abstract We propose the Robust Overlay Architecture for Mobility (ROAM) to provide
seamless mobility for Internet hosts. ROAM is built on top of the Internet Indirection …