Sciweavers

990 search results - page 28 / 198
» An Architecture for User Location in Heterogeneous Mobile Ne...
Sort
View
SAINT
2005
IEEE
14 years 2 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
CCS
2009
ACM
14 years 3 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
WIS
2004
13 years 10 months ago
Auctions in mobile multihop ad-hoc networks following the marketplace communication pattern
This paper presents UbiBay, a self-organizing distributed auction system using a mobile multihop ad-hoc network as its sole communication platform. In order to substantially increa...
Hannes Frey, Daniel Görgen, Johannes K. Lehne...
CAISE
2006
Springer
14 years 13 days ago
Aligning Software Architectures of Mobile Applications on Business Requirements
The support of mobile workers with mobile IT solutions can create dremendous improvements in mobile business processes of a company. The main charateristic of such a mobile system ...
Volker Gruhn, André Köhler
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 5 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan