Sciweavers

69 search results - page 14 / 14
» Detecting Impersonation Attacks in Future Wireless and Mobil...
Sort
View
INFOCOM
2008
IEEE
14 years 27 days ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
ACII
2005
Springer
14 years 1 days ago
The HandWave Bluetooth Skin Conductance Sensor
HandWave is a small, wireless, networked skin conductance sensor for affective computing applications. It is used to detect information related to emotional, cognitive, and physica...
Marc Strauss, Carson Reynolds, Stephen Hughes, Kyo...
INFOCOM
2010
IEEE
13 years 5 months ago
Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing
—Delay Tolerant Networks (DTN) are networks of self-organizing wireless nodes, where end-to-end connectivity is intermittent. In these networks, forwarding decisions are generall...
Theus Hossmann, Thrasyvoulos Spyropoulos, Franck L...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 8 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray