Sciweavers

761 search results - page 36 / 153
» Security Aspects of Mobile Communications
Sort
View
VTC
2007
IEEE
14 years 1 months ago
Time Behaviour and Network Encumbrance Due to Authentication in Wireless Mesh Access Networks
— In this paper we investigate the authentication behaviour of mobile nodes within wireless mesh access networks. This work evaluates the authentication time and the authenticati...
Andreas Roos, S. Wieland, A. Th. Schwarzbacher, Ba...
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 2 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
NETGAMES
2005
ACM
14 years 1 months ago
Framework for evaluation of networked mobile games
In this position paper we propose an evaluation framework for networked mobile gaming, consisting of user, group, communication, and environment models. Each of these components a...
Leo Petrak, Olaf Landsiedel, Klaus Wehrle
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
14 years 1 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim