Sciweavers

745 search results - page 112 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
IJIPT
2007
111views more  IJIPT 2007»
13 years 8 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss
ROBOCOMM
2007
IEEE
14 years 3 months ago
Portable surgery master station for mobile robotic telesurgery
— We describe a system that provides a low-cost, portable control station for experimentation in mobile robotic telesurgery. The software and hardware implementation of our syste...
Ganesh Sankaranarayanan, Hawkeye H. I. King, Seong...
WMASH
2004
ACM
14 years 2 months ago
SOWER: self-organizing wireless network for messaging
Short Message Service (SMS) has become extremely popular in many countries, and represents a multibillion dollars market. Yet many consumers consider that the price cellular netwo...
Márk Félegyházi, Srdjan Capku...
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 3 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 9 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt