— In this paper we investigate the authentication behaviour of mobile nodes within wireless mesh access networks. This work evaluates the authentication time and the authenticati...
Andreas Roos, S. Wieland, A. Th. Schwarzbacher, Ba...
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
In this position paper we propose an evaluation framework for networked mobile gaming, consisting of user, group, communication, and environment models. Each of these components a...
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...