Sciweavers

888 search results - page 44 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
HUC
2007
Springer
15 years 6 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
IIWAS
2004
15 years 1 months ago
Client and Server Mobility for WEB Applications
: As mobile devices and broadband networks are widely available, it is desirable to provide mobility for web services. A web service is mobile in the sense that, without interrupti...
Yi-Hua Tsai, Jian-Jia Chen, Tei-Wei Kuo, Chi-Sheng...
PET
2009
Springer
15 years 6 months ago
Physical Layer Attacks on Unlinkability in Wireless LANs
Abstract. Recent work has focused on hiding explicit network identifiers such as hardware addresses from the link layer to enable anonymous communications in wireless LANs. These ...
Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk ...
MSN
2007
Springer
125views Sensor Networks» more  MSN 2007»
15 years 6 months ago
Ensuring Area Coverage in Hybrid Wireless Sensor Networks
Success of Wireless Sensor Networks largely depends whether the deployed network can provide desired coverage with acceptable network lifetime. This paper proposes a distributed pr...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
PERCOM
2010
ACM
14 years 9 months ago
Integrating people-centric sensing with social networks: A privacy research agenda
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Ioannis Krontiris, Felix C. Freiling