Sciweavers

73 search results - page 6 / 15
» Efficient Authentication for Mobile and Pervasive Computing
Sort
View
FAST
2003
13 years 7 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 days ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
OSDI
2004
ACM
14 years 6 months ago
Energy-Efficiency and Storage Flexibility in the Blue File System
A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless...
Edmund B. Nightingale, Jason Flinn
PERCOM
2004
ACM
14 years 5 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 5 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt