Sciweavers

745 search results - page 71 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
WIMOB
2007
IEEE
14 years 3 months ago
Routing Packets into Wireless Mesh Networks
— Wireless mesh networks are a promising way to provide Internet access to fixed and mobile wireless devices. In mesh networks, traffic between mesh nodes and the Internet is r...
Rainer Baumann, Simon Heimlicher, Vincent Lenders,...
LCN
2007
IEEE
14 years 3 months ago
Secure Anonymous Broadcasting in Vehicular Networks
—Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between...
Christine Laurendeau, Michel Barbeau
IWCMC
2006
ACM
14 years 2 months ago
SCAR: context-aware adaptive routing in delay tolerant mobile sensor networks
Sensor devices are being embedded in all sorts of items including vehicles, furniture but also animal and human bodies through health monitors and tagging techniques. The collecti...
Cecilia Mascolo, Mirco Musolesi
INFOCOM
2010
IEEE
13 years 7 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 21 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...