Sciweavers

10044 search results - page 67 / 2009
» Authentication in Wireless Networks
Sort
View
MOBICOM
2006
ACM
15 years 5 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
CCS
2009
ACM
15 years 6 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
ICPPW
2009
IEEE
15 years 5 months ago
Link and Route Availability for Inter-working Multi-hop Wireless Networks
— In inter-working multi-hop wireless networks, establishing resilient connectivity between source-destination node pairs is a major issue. The issues of connectivity in multihop...
Oladayo Salami, Antoine B. Bagula, H. Anthony Chan
PERCOM
2004
ACM
15 years 10 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
CCR
2008
79views more  CCR 2008»
14 years 11 months ago
CRAWDAD workshop 2007
Wireless network researchers are hungry for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, the Community Resource f...
Jihwang Yeo, Tristan Henderson, David Kotz