Sciweavers

745 search results - page 10 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ESAS
2007
Springer
14 years 14 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
AINA
2006
IEEE
14 years 2 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 6 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
TIFS
2008
208views more  TIFS 2008»
13 years 8 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
ICC
2009
IEEE
147views Communications» more  ICC 2009»
14 years 3 months ago
A Distributed Protocol for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, in MANETs, enables users to generate, on-the-fly, complex strong specific systems. Current work ...
Eric Karmouch, Amiya Nayak