Sciweavers

644 search results - page 71 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
PDP
2008
IEEE
15 years 6 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
ICCSA
2004
Springer
15 years 5 months ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
SACMAT
2010
ACM
15 years 4 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
ICA3PP
2010
Springer
14 years 10 months ago
A New Visual Simulation Tool for Performance Evaluation of MANET Routing Protocols
A new user-friendly visual simulation tool; ViSim is presented. ViSim could be useful for researchers, students, teachers in their works, and for the demonstration of various wirel...
Md. Sabbir Rahman Sakib, Nazmus Saquib, Al-Sakib K...
PERCOM
2006
ACM
15 years 11 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...