Sciweavers

732 search results - page 42 / 147
» Mobility Management in Next Generation Wireless Systems
Sort
View
ICISC
1998
99views Cryptology» more  ICISC 1998»
15 years 16 days ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
15 years 5 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
NSF
2001
Springer
197views Computer Vision» more  NSF 2001»
15 years 3 months ago
A Collaborative Infrastructure for Mobile and Wireless Systems
Today‘s use of mobile phones is mostly for coordination purposes. It seems reasonable to assume that 3G and 4G high bandwidth systems will be used in a similar way. This paper th...
Lutz Michael Wegner, Morad Ahmad, Stefan Fröh...
139
Voted
JNSM
2002
218views more  JNSM 2002»
14 years 11 months ago
An Agent-based Connection Management Protocol for Ad Hoc Wireless Networks
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
SAC
2004
ACM
15 years 4 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann