Sciweavers

1331 search results - page 101 / 267
» Trusted Mobile Platforms
Sort
View
181
Voted
CN
2007
124views more  CN 2007»
15 years 3 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
135
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
DRIVE: a reconfigurable testbed for advanced vehicular services and communications
This paper introduces DRIVE, a reconfigurable demonstrator that will allow for experimental validation of vehicular networking research, as well as proof of concept and realistic ...
Carolina Pinart, Pilar Sanz, Iván Lequerica...
106
Voted
ICRA
2006
IEEE
116views Robotics» more  ICRA 2006»
15 years 9 months ago
PAW: a Hybrid Wheeled-leg Robot
— This paper discusses current wheeled mobility work on a hybrid wheeled-leg robot called PAW. In addition to providing design details, controllers are proposed for inclined turn...
James Andrew Smith, Inna Sharf, Michael Trentini
LCN
2008
IEEE
15 years 10 months ago
Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
—Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path...
Christine Laurendeau, Michel Barbeau
POLICY
2007
Springer
15 years 9 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka