Sciweavers

10044 search results - page 67 / 2009
» Authentication in Wireless Networks
Sort
View
131
Voted
MOBICOM
2006
ACM
15 years 9 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
144
Voted
CCS
2009
ACM
15 years 10 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
127
Voted
ICPPW
2009
IEEE
15 years 10 months ago
Link and Route Availability for Inter-working Multi-hop Wireless Networks
— In inter-working multi-hop wireless networks, establishing resilient connectivity between source-destination node pairs is a major issue. The issues of connectivity in multihop...
Oladayo Salami, Antoine B. Bagula, H. Anthony Chan
119
Voted
PERCOM
2004
ACM
16 years 3 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
122
Voted
CCR
2008
79views more  CCR 2008»
15 years 3 months ago
CRAWDAD workshop 2007
Wireless network researchers are hungry for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, the Community Resource f...
Jihwang Yeo, Tristan Henderson, David Kotz