Sciweavers

59 search results - page 11 / 12
» Distributed user authentication in wireless LANs
Sort
View
HUC
2010
Springer
13 years 7 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
IPSN
2010
Springer
14 years 1 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...
IEEEARES
2006
IEEE
14 years 19 days ago
Mitigating Denial of Service Threats in GSM Networks
–Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of servic...
Valer Bocan, Vladimir Cretu
IMSCCS
2006
IEEE
14 years 19 days ago
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
Peer-to-Peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing...
Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth ...
MOBISYS
2004
ACM
14 years 6 months ago
Improving the Latency of 802.11 hand-offs using Neighbor Graphs
The 802.11 IEEE Standard has enabled low cost and effective wireless LAN services (WLAN). With the sales and deployment of WLAN based networks exploding, many people believe that ...
Minho Shin, Arunesh Mishra, William A. Arbaugh