Sciweavers

61 search results - page 11 / 13
» Secure universal mobility for wireless internet
Sort
View
WS
2004
ACM
13 years 10 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
ISCC
2002
IEEE
120views Communications» more  ISCC 2002»
13 years 10 months ago
UMTS-TDD: a solution for internetworking Bluetooth piconets in indoor environments
–– The last few years have seen the evolution of telecommunications from the classic architectures, mainly based on static and wired structures, to the new mobile solutions bas...
Mario Gerla, Yeng-Zhong Lee, Rohit Kapoor, Ted Tae...
SAINT
2002
IEEE
13 years 10 months ago
Incremental Hoarding and Reintegration in Mobile Environments
Disconnection is one of the popular techniques for operating in mobile environments and is here to stay, until long-range wireless connectivity becomes a reality. However, disconn...
Abdelsalam Helal, Abhinav Khushraj, Jinsuo Zhang
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
13 years 8 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
NETWORK
2008
233views more  NETWORK 2008»
13 years 4 months ago
WhozThat? evolving an ecosystem for context-aware mobile social networks
One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new ...
Aaron Beach, Mike Gartrell, Sirisha Akkala, Jack E...