Sciweavers

1259 search results - page 12 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
AINA
2006
IEEE
14 years 1 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
IEEECSA
2009
13 years 5 months ago
A Fine-Grained Localization Scheme Using a Mobile Beacon Node for Wireless Sensor Networks
In this paper, we present a fine-grained localization algorithm for wireless sensor networks using a mobile beacon node. The algorithm is based on distance measurement using RSSI. ...
Kezhong Liu, Ji Xiong, Yongqiang Cui, Dong Han
PERCOM
2005
ACM
14 years 7 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
TON
2008
144views more  TON 2008»
13 years 7 months ago
A comprehensive analysis of mobility management in MPLS-based wireless access networks
Efficient mobility management is one of the major challenges for next-generation mobile systems. Indeed, a mobile node (MN) within an access network may cause excessive signaling t...
Rami Langar, Nizar Bouabdallah, Raouf Boutaba
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 7 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin