Sciweavers

275 search results - page 11 / 55
» Tracing Anonymous Mobile Attackers in Wireless Network
Sort
View
SASN
2006
ACM
15 years 5 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
JUCS
2008
149views more  JUCS 2008»
14 years 11 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
PERCOM
2005
ACM
15 years 11 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
WMASH
2004
ACM
15 years 5 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
INFOCOM
2011
IEEE
14 years 3 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz