Sciweavers

745 search results - page 127 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ADHOC
2008
88views more  ADHOC 2008»
13 years 9 months ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
COMPSEC
2006
97views more  COMPSEC 2006»
13 years 9 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
INFOCOM
2008
IEEE
14 years 3 months ago
An Empirical Activity Model for WLAN Users
Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
Caleb T. Phillips, Suresh Singh
HOTOS
2007
IEEE
14 years 23 days ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
ESAS
2007
Springer
14 years 3 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...