Organization of mobile networks under privacy constraints

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In order to process requests for mobile computing environment, locations and requests from users have to be stored in the system. If these data are stored in one centralized system, it may be rather easy to get history of locations/requests of a specific user. Since it is not desirable to obtain such information by other users, we will introduce a system which will store such information in distributed way. User related information is stored in Information Kiosks. Users’ requests are sent to the central network by adding request ID without disclosing user ID. The central network is also allowed to broadcast information to be used by users. For practical reason we select hierarchical form for the network. How to process requests from users in such mobile systems is discussed. In order to get information not stored in the Kiosk nearby, we propose a system to form adhoc LAN among neighboring mobile terminals. The function can be used to realize applications using the real and virtual world together.

Cite

CITATION STYLE

APA

Hamano, T., Takakura, H., & Kambayashi, Y. (1999). Organization of mobile networks under privacy constraints. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1749, pp. 317–323). Springer Verlag. https://doi.org/10.1007/978-3-540-46652-9_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free