Sciweavers

745 search results - page 21 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ADHOC
2007
133views more  ADHOC 2007»
13 years 8 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
GCC
2005
Springer
14 years 2 months ago
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile ...
Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Ki...
SIGCOMM
2012
ACM
11 years 11 months ago
Dismantling intrusion prevention systems
This paper introduces a serious security problem that people believe has been fixed, but which is still very much existing and evolving, namely evasions. We describe how protocols...
Olli-Pekka Niemi, Antti Levomäki, Jukka Manne...
CCS
2009
ACM
14 years 3 months ago
On cellular botnets: measuring the impact of malicious devices on a cellular network core
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper,...
Patrick Traynor, Michael Lin, Machigar Ongtang, Vi...
MOBISYS
2005
ACM
14 years 8 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...