Sciweavers

4985 search results - page 960 / 997
» Re-Configurable Computing in Wireless
Sort
View
WS
2004
ACM
14 years 4 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
ADHOCNOW
2004
Springer
14 years 4 months ago
Analysis of the Information Propagation Time Among Mobile Hosts
Consider k particles, 1 red and k −1 white, chasing each other on the nodes of a graph G. If the red one catches one of the white, it “infects” it with its color. The newly ...
Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. ...
ICDCSW
2003
IEEE
14 years 4 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
ICDCSW
2003
IEEE
14 years 4 months ago
Autonomous Cooperation Technologies for Achieving Real Time Property and Fault Tolerance in Service Oriented Community System
The advancement of wireless communication and mobile telecommunication has made mobile commerce possible. In the retail business under the evolving market, the users would like to...
Naohiro Kaji, Khaled Ragab, Takanori Ono, Kinji Mo...
P2P
2003
IEEE
205views Communications» more  P2P 2003»
14 years 4 months ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu