Sciweavers

561 search results - page 105 / 113
» A Secure Gateway Solution for Wireless Ad-Hoc Networks
Sort
View
129
Voted
COMCOM
2010
129views more  COMCOM 2010»
15 years 22 days ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
TDSC
2010
102views more  TDSC 2010»
14 years 11 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
97
Voted
INFOCOM
1999
IEEE
15 years 4 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 18 days ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
97
Voted
PERCOM
2007
ACM
16 years 6 days ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins