Sciweavers

275 search results - page 45 / 55
» Tracing Anonymous Mobile Attackers in Wireless Network
Sort
View
SASN
2005
ACM
15 years 5 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
ISJ
2010
14 years 9 months ago
User involvement in developing mobile and temporarily interconnected systems
Information systems (IS) research on user involvement has primarily theorized relationships between developers, managers and users in systems development. However, so far, marginal...
Ola Henfridsson, Rikard Lindgren
PERCOM
2004
ACM
15 years 11 months ago
Performance Issues with Vertical Handovers - Experiences from GPRS Cellular and WLAN Hot-spots Integration
Interworking heterogeneous wireless access technologies is an important step towards building the next generation, all-IP wireless access infrastructure. In this paper, we present...
Rajiv Chakravorty, Pablo Vidales, Kavitha Subraman...
FI
2010
175views more  FI 2010»
14 years 9 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 11 months ago
The Dynamics of Vehicular Networks in Urban Environments
Vehicular Ad hoc NETworks (VANETs) have emerged as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained a...
Nicholas Loulloudes, George Pallis, Marios D. Dika...