Sciweavers

39 search results - page 1 / 8
» Security challenges in seamless mobility: how to
Sort
View
WICON
2008
13 years 6 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
INTERSENSE
2006
ACM
13 years 10 months ago
Mobility management challenges and issues in 4G heterogeneous networks
Mobility is one of the most invigorating features, having an enormous impact on how communication is evolving into the future. Mobility in 4G networks requires new level of mobili...
Sadia Hussain, Zara Hamid, Naveed S. Khattak
CCS
2010
ACM
13 years 2 months ago
Secure encounter-based social networks: requirements, challenges, and designs
In this paper we outline requirements, challenges, and designs for encounter-based mobile social networks, where relationships are based on a temporarily shared location. To illus...
Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schu...
ICDCSW
2003
IEEE
13 years 10 months ago
Toward a Security Architecture for Smart Messages: Challenges, Solutions, and Open Issues
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs ar...
Gang Xu, Cristian Borcea, Liviu Iftode
IPCCC
2006
IEEE
13 years 10 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...