Sciweavers

1259 search results - page 151 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
ISW
2004
Springer
14 years 1 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
MOBIHOC
2006
ACM
14 years 7 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 10 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
CN
2008
192views more  CN 2008»
13 years 8 months ago
Research on multicast routing protocols for mobile ad-hoc networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to ext...
Junhai Luo, Xue Liu, Danxia Ye
WWW
2001
ACM
14 years 8 months ago
Using proxy cache relocation to accelerate Web browsing in wireless/mobile communications
Mobile computing is considered of major importance to the computing industry for the forthcoming years due to the progress in the wireless communications area. A proxy-based archi...
Stathes Hadjiefthymiades, Lazaros F. Merakos