Sciweavers

636 search results - page 19 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
WISEC
2010
ACM
14 years 3 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
MMNS
2003
143views Multimedia» more  MMNS 2003»
13 years 9 months ago
M3G: A Mobile Multicast Multimedia Gateway for Seamless IPv4/IPv6 Transition
A growing interest in third generation wireless IP network and service technologies, push up the demand on IPv6 transition. Most of these services require mobility, multicast and m...
Yassine Hadjadj Aoul, Daniel Negru, Abdelhamid Naf...
CSREAPSC
2006
13 years 10 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
INFOCOM
2009
IEEE
14 years 3 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang
CMS
1996
167views Communications» more  CMS 1996»
13 years 9 months ago
Anonymous Mobility Management for Third Generation Mobile Networks
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mob...
Simon Hoff, Kai Jakobs, Dogan Kesdogan