Sciweavers

745 search results - page 105 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ECUMN
2007
Springer
13 years 10 months ago
Towards Sensor Integration into Multimedia Applications
Since few years, several applications are proposed on mobile devices. However, these applications are not aware of their physical environment. The emergence of wireless sensors, a...
Christine Louberry, Philippe Roose, Marc Dalmau
WS
2005
ACM
14 years 2 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
ICDCS
2005
IEEE
14 years 2 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 10 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 8 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang