Sciweavers

350 search results - page 43 / 70
» Accelerating Key Establishment Protocols for Mobile Communic...
Sort
View
CCS
2008
ACM
15 years 6 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
INFOCOM
2010
IEEE
15 years 2 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
WAIM
2007
Springer
15 years 10 months ago
An Adaptive Dynamic Cluster-Based Protocol for Target Tracking in Wireless Sensor Networks
The rapid progress of wireless communication and embedded micro sensing technologies has made wireless sensor networks possible. Target tracking is an important application of wire...
WenCheng Yang, Zhen Fu, Jung-Hwan Kim, Myong-Soon ...
SAC
2009
ACM
15 years 11 months ago
A flexible QoS-aware routing protocol for infrastructure-less B3G networks
Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key...
Natallia Kokash, Roberto Speicys Cardoso, Pierre-G...
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan