Sciweavers

278 search results - page 51 / 56
» Information Acquisition and Exploitation in Multichannel Wir...
Sort
View
MOBISYS
2007
ACM
16 years 1 months ago
Vehicular opportunistic communication under the microscope
We consider the problem of providing vehicular Internet access using roadside 802.11 access points. We build on previous work in this area [18, 8, 5, 11] with an extensive experim...
David Hadaller, Srinivasan Keshav, Tim Brecht, Shu...
PERCOM
2007
ACM
16 years 1 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
MOBISYS
2003
ACM
16 years 1 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...
OPODIS
2004
15 years 3 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 1 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau