Sciweavers

2454 search results - page 347 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ICITA
2005
IEEE
15 years 3 months ago
WiFiAdmin: An Intelligent Web-Based Management Environment for Wireless Networks
Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution...
Eythimios Dimopoulos, Athanasios Panousis, Evangel...
ITCC
2005
IEEE
15 years 3 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
ITCC
2005
IEEE
15 years 3 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
ITCC
2005
IEEE
15 years 3 months ago
Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks
Frequency hopping is a technique that wireless devices communicate in a way that the transmission frequencies are alternated in a pre-determined ordered hopping pattern known only...
Min Song, Scott Wigginton
MM
2004
ACM
139views Multimedia» more  MM 2004»
15 years 3 months ago
MobShare: controlled and immediate sharing of mobile images
In this paper we describe the design and implementation of a mobile phone picture sharing system MobShare that enables immediate, controlled, and organized sharing of mobile pictu...
Risto Sarvas, Mikko Viikari, Juha Pesonen, Hanno N...