Sciweavers

1247 search results - page 237 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
KBSE
2005
IEEE
15 years 7 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
MOBISYS
2008
ACM
16 years 1 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
145
Voted
MOBICOM
2005
ACM
15 years 7 months ago
VITP: an information transfer protocol for vehicular computing
Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deploymen...
Marios D. Dikaiakos, Saif Iqbal, Tamer Nadeem, Liv...
128
Voted
TWC
2008
154views more  TWC 2008»
15 years 1 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
FIW
2003
120views Communications» more  FIW 2003»
15 years 3 months ago
A Policy Architecture for Enhancing and Controlling Features
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec, Kenneth J. Turner