Sciweavers

154 search results - page 16 / 31
» Authenticity in a Reliable Protocol for Mobile Computing
Sort
View
P2P
2007
IEEE
110views Communications» more  P2P 2007»
15 years 3 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
CCS
2009
ACM
15 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
DSN
2009
IEEE
15 years 4 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
PERCOM
2004
ACM
15 years 9 months ago
An Adaptive Approach to Content-Based Subscription in Mobile Ad Hoc Networks
We describe a novel approach for content-based publish/subscribe system in mobile ad-hoc networks and show preliminary experiment results. We extended ODMRP (OnDemand Multicast Rou...
Eiko Yoneki, Jean Bacon
ICNP
2007
IEEE
15 years 3 months ago
Cooperation Between Stations in Wireless Networks
Abstract— In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, part...
Andrea G. Forte, Henning Schulzrinne