Sciweavers

804 search results - page 91 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
133
Voted
MOBICOM
2004
ACM
15 years 10 months ago
SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks
Capacity improvement is one of the principal challenges in wireless networking. We present a link-layer protocol called Slotted Seeded Channel Hopping, or SSCH, that increases the...
Paramvir Bahl, Ranveer Chandra, John Dunagan
CCS
2004
ACM
15 years 10 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
PERVASIVE
2004
Springer
15 years 10 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
ICDCSW
2002
IEEE
15 years 9 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
IDMS
1997
Springer
182views Multimedia» more  IDMS 1997»
15 years 8 months ago
mTunnel: A Multicast Tunneling System with a User Based Quality-of-Service Model
Abstract. This paper presents a system, called mTunnel, for application level tunneling of multicast trac in a lightweight manner, where the end-user is responsible for deciding w...
Peter Parnes, Kåre Synnes, Dick Schefstr&oum...