Sciweavers

745 search results - page 26 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
SIGCOMM
2012
ACM
11 years 11 months ago
First insights from a mobile honeypot
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Matthias Wählisch, Sebastian Trapp, Christian...
ASE
2005
96views more  ASE 2005»
13 years 8 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
GLOBECOM
2009
IEEE
14 years 3 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak
ACISP
2007
Springer
14 years 19 days ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
WIOPT
2005
IEEE
14 years 2 months ago
Securing Route Optimisation in NEMO
The Network Mobility (NEMO) Basic Support protocol enables mobile networks to change their point of attachment to the Internet, while preserving established sessions of the nodes ...
María Calderón, Carlos Jesus Bernard...