Sciweavers

17 search results - page 2 / 4
» Cryptanalysis of Park's Authentication Protocol in Wireless ...
Sort
View
SAC
2002
ACM
13 years 4 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
CCS
2001
ACM
13 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ICWN
2004
13 years 6 months ago
An Embedded Healthcare System for Blood Glucose Monitoring in a Body Area Network
This paper presents a Java service platform and hardware design for a handheld healthcare system that enables remote health monitoring using CDMA public wireless networks. Special...
Kil-Ho Ahn, Jae-Wan Park, Dong Ryeol Shin, Ji-Tae ...
PEWASUN
2004
ACM
13 years 10 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
P2P
2007
IEEE
110views Communications» more  P2P 2007»
13 years 11 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle