Sciweavers

1462 search results - page 11 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 7 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
WMASH
2004
ACM
14 years 4 days ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 6 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
MOBIWAC
2009
ACM
14 years 1 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 1 months ago
Multiple Backhaul Mobile Access Router: Design and Experimentation
—The Multiple Backhaul Mobile Access Router aims to provide high capacity and high performance Internet access for emerging mobile wireless applications. In this paper we describ...
Yan Sun, Fangfei Chen, Thomas F. La Porta