Sciweavers

745 search results - page 49 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
IJWIS
2006
126views more  IJWIS 2006»
13 years 8 months ago
Web services on embedded devices
Abstract-- The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. F...
Daniel Schall, Marco Aiello, Schahram Dustdar
HASE
2007
IEEE
14 years 3 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves
AINA
2006
IEEE
14 years 13 days ago
An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks
Achieving IP handoff with a short latency and minimal packet loss is essential for mobile devices that roam across IP subnets. Many existing solutions require changes to be made t...
Ken C. K. Tsang, Roy S. C. Ho, Mark C. M. Tsang, C...
NETWORKING
2011
12 years 11 months ago
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth-equipped mobile devices. Unfortunately, virus write...
Nicholas Valler, B. Aditya Prakash, Hanghang Tong,...
ICDCSW
2002
IEEE
14 years 1 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...