Sciweavers

745 search results - page 103 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
TRIDENTCOM
2008
IEEE
14 years 3 months ago
A quantitative evaluation of the MeshTest wireless testbed
The MeshTest testbed is designed to subject wireless devices and protocols to realistic and repeatable mobile scenarios, including multi-hop and disconnected topologies. The testb...
Brenton Walker, Charles Clancy
CCS
2006
ACM
14 years 17 days ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
MOBIHOC
2007
ACM
14 years 8 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
On Improving Dynamic Source Routing for Intermittently Available Nodes in MANETs
—Previous work on routing in MANETs has resulted in numerous routing protocols that aim at satisfying constraints such as minimum hop or low energy. Existing routing protocols of...
Pramita Mitra, Christian Poellabauer, Shivajit Moh...
WISEC
2009
ACM
14 years 3 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru