Sciweavers

745 search results - page 133 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ACSC
2009
IEEE
14 years 3 months ago
ALARM: An Adaptive Load-Aware Routing Metric for Hybrid Wireless Mesh Networks
Abstract— Hybrid Wireless Mesh Networks (WMN) are generally employed to establish communication during disaster recovery operations. The Hybrid WMN network is formed in a spontan...
Asad Amir Pirzada, Ryan Wishart, Marius Portmann, ...
BROADNETS
2005
IEEE
14 years 2 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
IFIP
2004
Springer
14 years 2 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
WCNC
2010
IEEE
14 years 15 days ago
Socially-Aware Publish/Subscribe System for Human Networks
Abstract—The development of modern communication technologies fosters human networks (HUNETs)—an information dissemination platform comprised of human-carried wirelessenabled d...
Yaxiong Zhao, Jie Wu
ACSAC
2005
IEEE
14 years 2 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...