The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
Using the new wireless technologies, mobile devices with small displays (handhelds, PDAs, mobile phones) are present in many environments. We are interested in the effective use of...
Mobility models must scale accordingly to the application and reflect real scenarios in which wireless devices are deployed. Typical examples of scenarios requiring precise mobilit...
Franck Legendre, Vincent Borrel, Marcelo Dias de A...
— Mobile agents are considered a suitable technology to develop applications for wireless environments with limited communication capabilities. Thus, they offer interesting advan...
The demand for cellular data networks is expected to increase with 3G and beyond technologies accompanied by highbandwidth consumer services, such as wireless video and camera pho...