Sciweavers

2691 search results - page 94 / 539
» Securing Ad Hoc Networks
Sort
View
SP
2002
IEEE
143views Security Privacy» more  SP 2002»
15 years 4 months ago
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
In this paper, we introduce a new class of side
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, S...
ESSOS
2009
Springer
15 years 9 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
IFIP8
2004
15 years 5 months ago
Ad hoc Service Grid - A Self-Organizing Infrastructure for Mobile Commerce
: The provisioning of location-specific services in medium-sized facilities like shopping malls, hospitals, and trade fares using WLAN access points or cellular phone systems has s...
Klaus Herrmann, Kurt Geihs, Gero Mühl
MOBIHOC
2003
ACM
16 years 4 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
ESORICS
2010
Springer
15 years 5 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...