Sciweavers

636 search results - page 103 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
CCS
2010
ACM
13 years 8 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
MOBISYS
2011
ACM
12 years 11 months ago
Opportunistic alignment of advertisement delivery with cellular basestation overloads
This paper is motivated by two observations: (1) cellular network operators are actively exploring advertisement delivery as a new means of revenue generation, and (2) cellular ba...
Ravi Kokku, Rajesh Mahindra, Sampath Rangarajan, H...
GLOBECOM
2008
IEEE
13 years 9 months ago
Hierarchical Scanning Algorithm for Integrated Mobile and Nomadic Access Systems
—In next generation wireless networks, not only wide area cells to provide moderate data rate with full mobility but also local area cells to support high data rate with local mo...
Jung-Min Moon, Dong-Ho Cho
EJWCN
2011
87views more  EJWCN 2011»
13 years 3 months ago
Resource Allocation for Overlapping MBS Zones
— Multicast and broadcast service (MBS) is one of the important services for next generation wireless systems. In WiMAX, the radio resource unit (i.e., time, frequency, code, etc...
Ray-Guang Cheng, Kuo-Jui Huang
IMC
2007
ACM
13 years 10 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...