Sciweavers

94 search results - page 4 / 19
» Mobile Privacy in Wireless Networks-Revisited
Sort
View
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
PST
2004
13 years 9 months ago
Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
Ali Grami, Bernadette Schell
PERCOM
2005
ACM
14 years 7 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns
HOTOS
2007
IEEE
13 years 11 months ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
MOBISYS
2007
ACM
14 years 7 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu