Sciweavers

745 search results - page 88 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
MONET
2002
117views more  MONET 2002»
13 years 8 months ago
A Service Management Framework for M-Commerce Applications
Mobile commerce (m-commerce) refers to an ability to conduct wireless commerce transactions using mobile applications in mobile devices. M-commerce applications can range from as s...
Gary Shih, Simon S. Y. Shim
WOWMOM
2006
ACM
84views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Measurements from an 802.11b Mobile Ad Hoc Network
This paper analyzes the characteristics of a multi-hop 802.11b mobile ad hoc network. We present data gathered from a mobile network of 20 devices carried by test users over 5 day...
Vincent Lenders, Jorg Wagner, Martin May
EUROSSC
2006
Springer
14 years 14 days ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas
JCM
2010
98views more  JCM 2010»
13 years 7 months ago
High Speed Data Routing in Vehicular Sensor Networks
—In this paper, we show through a simple secure symmetric key based protocol design and experiments the feasibility of secure data collection in a vehicular sensor networks. This...
Harry Gao, Seth Utecht, Gregory Patrick, George Hs...
ICC
2009
IEEE
119views Communications» more  ICC 2009»
14 years 3 months ago
Secure Signaling in Next Generation Networks with NSIS
—The IETF working group Next Steps in Signaling (NSIS) develops signaling protocols for Quality-of-Service (QoS) reservations or dynamic NAT and firewall (NAT/FW) configuration...
Roland Bless, Martin Röhricht