Sciweavers

547 search results - page 85 / 110
» Analysis of a mobile communication security protocol
Sort
View
MONET
2010
148views more  MONET 2010»
15 years 4 days ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
CCS
2003
ACM
15 years 7 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
ICDCS
2003
IEEE
15 years 7 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
ESORICS
2009
Springer
16 years 2 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
ICC
2007
IEEE
112views Communications» more  ICC 2007»
15 years 8 months ago
Cross-layer Design and Analysis of Wireless Profiled TCP for Vertical Handover
Abstract - In this paper, we consider downward and upward vertical handovers in integrated wireless LAN and cellular networks, and address Wireless Profiled TCP premature timeouts ...
Humphrey Rutagemwa, Sangheon Pack, Xuemin Shen, Jo...