Sciweavers

201 search results - page 26 / 41
» Applications and Security of Next-Generation, User-Centric W...
Sort
View
WWW
2008
ACM
15 years 10 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
SASN
2005
ACM
15 years 3 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
NETWORK
2006
96views more  NETWORK 2006»
14 years 9 months ago
A wireless biosensor network using autonomously controlled animals
Recent research shows that animals can be guided remotely by stimulating regions of the brain. Therefore, it is possible to set up an animal wireless sensor network for search and...
Yihan Li, Shivendra S. Panwar, Shiwen Mao
GIS
2008
ACM
14 years 10 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
IJNSEC
2007
253views more  IJNSEC 2007»
14 years 9 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd