Sciweavers

336 search results - page 11 / 68
» Mobile values, new names, and secure communication
Sort
View
NDSS
2003
IEEE
15 years 2 months ago
Integrating Security, Mobility and Multi-Homing in a HIP Way
The current trend in mobile networking is towards mobile hosts that have multiple network interfaces, e.g., WLAN and GPRS. However, when the current Internet architecture was orig...
Pekka Nikander, Jukka Ylitalo, Jorma Wall
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 4 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
INFOCOM
2006
IEEE
15 years 3 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
NETWORK
2006
89views more  NETWORK 2006»
14 years 9 months ago
Reconsidering microscopic mobility modeling for self-organizing networks
Mobility modeling is a critical step in the design of mobile self-organizing networks. With the emergence of small-scale and short-range wireless communication devices, the commun...
Franck Legendre, Vincent Borrel, Marcelo Dias de A...
110
Voted
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
15 years 3 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...