Sciweavers

1597 search results - page 211 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
COMSWARE
2008
IEEE
14 years 3 months ago
Location management area (LMA)-based MBS handover in mobile WiMAX systems
Abstract—Mobile WiMAX aims to provide multimedia multicast/broadcast service (MBS) as well as elastic data service. However, supporting delay sensitive applications like video/au...
Ji Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheo...
MOBIHOC
2002
ACM
14 years 8 months ago
Minimum energy paths for reliable communication in multi-hop wireless networks
Current algorithms for minimum-energy routing in wireless networks typically select minimum-cost multi-hop paths. In scenarios where the transmission power is fixed, each link has...
Suman Banerjee, Archan Misra
EUROSYS
2011
ACM
13 years 17 days ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
ACSAC
2007
IEEE
14 years 3 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...

Tutorial
2179views
15 years 9 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel