Sciweavers

745 search results - page 41 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ADHOCNOW
2008
Springer
14 years 3 months ago
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care w...
Dave Singelée, Benoît Latré, B...
CNSM
2010
13 years 6 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability...
Frederic Beck, Olivier Festor, Isabelle Chrisment,...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 6 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
OTM
2007
Springer
14 years 2 months ago
A Novel Overlay Network for a Secure Global Home Agent Dynamic Discovery
Mobile IP and Network Mobility are the IETF proposals to obtain mobility. However, both of them have routing limitations, due to the presence of an entity (Home Agent) in the commu...
Ángel Cuevas, Rubén Cuevas Rum&iacut...
INFOCOM
2011
IEEE
13 years 2 days ago
Ubiquitous data collection for mobile users in wireless sensor networks
Abstract—We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data....
Zhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao