Sciweavers

25 search results - page 3 / 5
» So Near and Yet So Far: Distance-Bounding Attacks in Wireles...
Sort
View
ICDE
2006
IEEE
190views Database» more  ICDE 2006»
13 years 11 months ago
Ant Algorithms for Search in Unstructured Peer-to-Peer Networks
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is yet known about its applicability to the task of...
Elke Michlmayr
IJSN
2006
116views more  IJSN 2006»
13 years 5 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
MONET
2002
188views more  MONET 2002»
13 years 5 months ago
Mobile Commerce: Framework, Applications and Networking Support
Advances in e-commerce have resulted in significant progress towards strategies, requirements, and development of e-commerce applications. However, nearly all e-commerce applicatio...
Upkar Varshney, Ronald J. Vetter
WS
2004
ACM
13 years 11 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
IAT
2006
IEEE
13 years 11 months ago
Enhanced Recommendations through Propagation of Trust and Distrust
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Patricia Victor, Chris Cornelis, Martine De Cock