Sciweavers

745 search results - page 88 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
MONET
2002
117views more  MONET 2002»
15 years 4 months ago
A Service Management Framework for M-Commerce Applications
Mobile commerce (m-commerce) refers to an ability to conduct wireless commerce transactions using mobile applications in mobile devices. M-commerce applications can range from as s...
Gary Shih, Simon S. Y. Shim
WOWMOM
2006
ACM
84views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Measurements from an 802.11b Mobile Ad Hoc Network
This paper analyzes the characteristics of a multi-hop 802.11b mobile ad hoc network. We present data gathered from a mobile network of 20 devices carried by test users over 5 day...
Vincent Lenders, Jorg Wagner, Martin May
EUROSSC
2006
Springer
15 years 8 months ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas
JCM
2010
98views more  JCM 2010»
15 years 2 months ago
High Speed Data Routing in Vehicular Sensor Networks
—In this paper, we show through a simple secure symmetric key based protocol design and experiments the feasibility of secure data collection in a vehicular sensor networks. This...
Harry Gao, Seth Utecht, Gregory Patrick, George Hs...
ICC
2009
IEEE
119views Communications» more  ICC 2009»
15 years 11 months ago
Secure Signaling in Next Generation Networks with NSIS
—The IETF working group Next Steps in Signaling (NSIS) develops signaling protocols for Quality-of-Service (QoS) reservations or dynamic NAT and firewall (NAT/FW) configuration...
Roland Bless, Martin Röhricht