Sciweavers

Share
GLOBECOM
2010
IEEE
8 years 6 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
INFOCOM
2010
IEEE
8 years 6 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
CN
2004
107views more  CN 2004»
8 years 8 months ago
A multicriteria handoff decision scheme for the next generation tactical communications systems
In this paper a novel handoff decision algorithm for the mobile subsystem of tactical communications systems is introduced. In this algorithm, handoff decision metrics are: receiv...
Tolga Onel, Cem Ersoy, Erdal Cayirci, Gerard Parr
CN
2004
128views more  CN 2004»
8 years 8 months ago
A smooth handoff scheme using IEEE802.11 triggers - design and implementation
This paper proposes a handoff scheme in a wireless access network where IEEE802.11 is used as link layer protocol and Mobile IP as network layer protocol. The scheme uses triggers...
Peter De Cleyn, Nik Van den Wijngaert, Lloren&cced...
TIT
2008
100views more  TIT 2008»
8 years 8 months ago
Communication Via Decentralized Processing
Abstract-- The common problem of a nomadic terminal sending information to a remote destination via agents with lossless connections is investigated. Such a setting suits, e.g. acc...
Amichai Sanderovich, Shlomo Shamai, Yossef Steinbe...
COMCOM
2008
112views more  COMCOM 2008»
8 years 8 months ago
A game-theoretic analysis of wireless access point selection by mobile users
A user located in a congested area of a wireless LAN may benefit by moving to a less-crowded area and using a less-loaded access point. This idea has gained attention from research...
Kimaya Mittal, Elizabeth M. Belding, Subhash Suri
COMCOM
2010
129views more  COMCOM 2010»
8 years 8 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
MM
2010
ACM
121views Multimedia» more  MM 2010»
8 years 8 months ago
Implementation and demonstration of a credit-based home access point
The increasing availability of high speed Internet access and the decreasing cost of wireless technologies has increased the number of devices in the home that wirelessly connect ...
Choong-Soo Lee, Mark Claypool, Robert E. Kinicki
WMI
2001
147views more  WMI 2001»
8 years 9 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
NSDI
2007
8 years 10 months ago
A Location-Based Management System for Enterprise Wireless LANs
: The physical locations of clients and access points in a wireless LAN may have a large impact on network performance. However, today’s WLAN management tools do not provide info...
Ranveer Chandra, Jitendra Padhye, Alec Wolman, Bri...
books