Sciweavers

461 search results - page 41 / 93
» Protecting Transportation Infrastructure
Sort
View
ACISP
2005
Springer
14 years 3 months ago
Traversing Middleboxes with the Host Identity Protocol
The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multi...
Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, A...
SIGCOMM
2012
ACM
12 years 13 days ago
First insights from a mobile honeypot
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Matthias Wählisch, Sebastian Trapp, Christian...
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 4 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
JUCS
2010
176views more  JUCS 2010»
13 years 4 months ago
Integrating Personal Web Data through Semantically Enhanced Web Portal
: Currently, the World Wide Web is mostly composed of isolated and loosely connected "data islands". Connecting them together and retrieving only the information that is ...
Lidia Rovan, Tomislav Jagust, Mirta Baranovic
WWW
2008
ACM
14 years 10 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida