Sciweavers

1259 search results - page 85 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
JDCTA
2010
139views more  JDCTA 2010»
13 years 2 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
TCOM
2008
120views more  TCOM 2008»
13 years 7 months ago
Network Coding for Efficient Multicast Routing in Wireless Ad-hoc Networks
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networ...
Jingyao Zhang, Pingyi Fan, Khaled Ben Letaief
INFOCOM
2011
IEEE
12 years 11 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
NAS
2009
IEEE
14 years 2 months ago
TinyBee: Mobile-Agent-Based Data Gathering System in Wireless Sensor Networks
—This paper proposes a mobile-agent-based data gathering system (called TinyBee) in wireless sensor networks. Most existing mobile-agent-based systems consider only static sinks/...
Kaoru Ota, Mianxiong Dong, Xiaolin Li
ICWN
2003
13 years 9 months ago
Eurecom IPv6 Soft Handover
The growing demand for high-speed wireless access to the Internet is the driving force behind the current trends to design All-IP wireless networks, whose Access Router and mobile ...
Farouk Belghoul, Yan Moret, Christian Bonnet