Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
— Two important high bandwidth wireless certifications in our days are Worldwide Interoperability for Microwave Access (WiMax) and Wireless Fidelity (WiFi). They can interoperate...
One motivation of mobile Next-Generation Networks (NGN) is the ubiquitous computing abilities, which provide automatic handovers for any moving computing devices in a globally net...
Although small mobile computers have processors whose capabilities are increasing, often they still are resource constrained in terms of performing many common computing tasks. Co...
Shivani Sud, Roy Want, Trevor Pering, Barbara Rosa...
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...