Sciweavers

99 search results - page 3 / 20
» On securely enabling intermediary-based services and perform...
Sort
View
BROADNETS
2005
IEEE
14 years 1 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
VTC
2006
IEEE
199views Communications» more  VTC 2006»
14 years 1 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
WIS
2004
13 years 8 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
ICDCS
2005
IEEE
14 years 1 months ago
A Spatiotemporal Query Service for Mobile Users in Sensor Networks
This paper presents MobiQuery, a spatiotemporal query service that allows mobile users to periodically gather information from their surrounding areas through a wireless sensor ne...
Chenyang Lu, Guoliang Xing, Octav Chipara, Chien-L...
PEWASUN
2004
ACM
14 years 27 days ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...