Sciweavers

2123 search results - page 335 / 425
» Mobile computing in next generation wireless networks
Sort
View
WS
2004
ACM
15 years 10 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
JDCTA
2010
150views more  JDCTA 2010»
14 years 11 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
WWW
2004
ACM
16 years 5 months ago
Session level techniques for improving web browsing performance on wireless links
Recent observations through experiments that we have performed in current third generation wireless networks have revealed that the achieved throughput over wireless links varies ...
Pablo Rodriguez, Sarit Mukherjee, Sampath Rangaraj...
INFOCOM
2000
IEEE
15 years 9 months ago
Distributed Power Control and Spreading Gain Allocation in CDMA Data Networks
We study the radio resource allocation problem of distributed joint transmission power control and spreading gain allocation in a DS-CDMA mobile data network. The network consists...
Seong-Jun Oh, Tava Lennon Olsen, Kimberly M. Wasse...
VTC
2010
IEEE
259views Communications» more  VTC 2010»
15 years 2 months ago
User Multiplexing in Relay Enhanced LTE-Advanced Networks
—The 3rd Generation Partnership Project has recently started the standardization process for LTE-Advanced, as a major evolution step of UTRAN LTE Release 8. One of the key enhanc...
Oumer M. Teyeb, Frank Frederiksen, Vinh Van Phan, ...