Sciweavers

119 search results - page 10 / 24
» Secure Localization with Hidden and Mobile Base Stations
Sort
View
89
Voted
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 5 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
WIMOB
2007
IEEE
15 years 6 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
92
Voted
NIPS
2003
15 years 1 months ago
GPPS: A Gaussian Process Positioning System for Cellular Networks
In this article, we present a novel approach to solving the localization problem in cellular networks. The goal is to estimate a mobile user’s position, based on measurements of...
Anton Schwaighofer, Marian Grigoras, Volker Tresp,...
105
Voted
IFIPTM
2010
139views Management» more  IFIPTM 2010»
14 years 11 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
131
Voted
INFOCOM
2000
IEEE
15 years 4 months ago
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...