Sciweavers

338 search results - page 43 / 68
» A New Key Distribution Scheme for Secure Multicast Communica...
Sort
View
WWW
2005
ACM
15 years 10 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
MOBIHOC
2009
ACM
15 years 10 months ago
MotionCast: on the capacity and delay tradeoffs
In this paper, we define multicast for ad hoc network through nodes' mobility as MotionCast, and study the capacity and delay tradeoffs for it. Assuming nodes move according ...
Chenhui Hu, Xinbing Wang, Feng Wu
75
Voted
WMCSA
2008
IEEE
15 years 4 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot
COMCOM
2008
104views more  COMCOM 2008»
14 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
MATA
2005
Springer
146views Communications» more  MATA 2005»
15 years 3 months ago
Distributed Authorization Framework for Mobile Agents
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...