Sciweavers

1247 search results - page 239 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
PODC
2003
ACM
15 years 2 months ago
Geometric ad-hoc routing: of theory and practice
All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc rout...
Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Z...
WS
2004
ACM
15 years 3 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
MIDDLEWARE
2004
Springer
15 years 3 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
ICOIN
2004
Springer
15 years 3 months ago
A Routing Strategy for Metropolis Vehicular Communications
One of the major issues that affect the performance of mobile ad hoc networks (MANET) is routing. Recently, position-based routing for MANET is found to be a very promising routin...
Genping Liu, Bu-Sung Lee, Boon-Chong Seet, Chuan H...
MOBIMEDIA
2007
14 years 11 months ago
Experimental evaluation of community-based WLAN voice and data services
The purpose of this work is to experimentally evaluate the quality of voice and data services over community-based WLAN access networks. We use P2PWNC, the Wireless LAN roaming ar...
Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dim...