Sciweavers

745 search results - page 30 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
EUC
2007
Springer
14 years 2 months ago
Evaluating Mobility Support in ZigBee Networks
Abstract. The deployment of ZigBee networks is expected to facilitate numerous applications, such as home healthcare, medical monitoring, consumer electronics, and environmental se...
Tony Sun, Nia-Chiang Liang, Ling-Jyh Chen, Ping-Ch...
MOBISYS
2004
ACM
14 years 8 months ago
Bluetooth and WAP Push Based Location-Aware Mobile Advertising System
Advertising on mobile devices has large potential due to the very personal and intimate nature of the devices and high targeting possibilities. We introduce a novel B-MAD system f...
Lauri Aalto, Nicklas Göthlin, Jani Korhonen, ...
ARESEC
2011
119views more  ARESEC 2011»
12 years 8 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
ICC
2009
IEEE
149views Communications» more  ICC 2009»
14 years 3 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
LCN
2002
IEEE
14 years 1 months ago
Simulation of Route Optimization in Mobile IP
Mobile Internet Protocol has been proposed by IETF to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic ...
Hao Chen, Ljiljana Trajkovic