Sciweavers

270 search results - page 21 / 54
» Securing Wireless Networks in a University Environment
Sort
View
105
Voted
MMS
2007
15 years 1 months ago
Standards for Ambient Learning Environments
: The integration of information systems is not a new challenge. As one instrument, standards provide interfaces for integrated information systems. With regard to the recent adven...
Markus Bick, Tyge Kummer, Jan M. Pawlowski, Patric...
ICMB
2005
IEEE
79views Business» more  ICMB 2005»
15 years 5 months ago
Identity Management in Vertical Handovers for UMTS-WLAN Networks
One motivation of mobile Next-Generation Networks (NGN) is the ubiquitous computing abilities, which provide automatic handovers for any moving computing devices in a globally net...
Mo Li, Kumbesan Sandrasegaran, Xiaoan Huang
CCS
2003
ACM
15 years 5 months ago
A pairwise key pre-distribution scheme for wireless sensor networks
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication pu...
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod ...
PERCOM
2007
ACM
15 years 11 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
104
Voted
WD
2010
14 years 9 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla