Sciweavers

275 search results - page 12 / 55
» Tracing Anonymous Mobile Attackers in Wireless Network
Sort
View
MOBICOM
1999
ACM
15 years 4 months ago
Analysis of a Metropolitan-Area Wireless Network
We analyze a seven-week trace of the Metricom metropolitan-area packet radio wireless network to find how users take advantage of a mobile environment. Such understanding is criti...
Diane Tang, Mary Baker
MOBISYS
2006
ACM
15 years 11 months ago
Building realistic mobility models from coarse-grained traces
In this paper we present a trace-driven framework capable of building realistic mobility models for the simulation studies of mobile systems. With the goal of realism, this framew...
Jungkeun Yoon, Brian D. Noble, Mingyan Liu, Minkyo...
TWC
2008
129views more  TWC 2008»
14 years 11 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
TMC
2010
104views more  TMC 2010»
14 years 10 months ago
On Nodal Encounter Patterns in Wireless LAN Traces
—In this paper we analyze multiple wireless LAN (WLAN) traces from university and corporate campuses. In particular, we consider an important event between mobile nodes in wirele...
Wei-jen Hsu, Ahmed Helmy
SP
2006
IEEE
15 years 5 months ago
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
Philippe Golle, XiaoFeng Wang, Markus Jakobsson, A...