Sciweavers

275 search results - page 8 / 55
» Tracing Anonymous Mobile Attackers in Wireless Network
Sort
View
WCNC
2008
IEEE
15 years 3 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
AINA
2006
IEEE
15 years 1 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel
WPES
2003
ACM
15 years 2 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
MASS
2010
162views Communications» more  MASS 2010»
14 years 4 months ago
Improving anti-jamming capability and increasing jamming impact with mobility control
Abstract--The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the...
Patrick Tague
78
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Extracting a Mobility Model from Real User Traces
Abstract— Understanding user mobility is critical for simulations of mobile devices in a wireless network, but current mobility models often do not reflect real user movements. ...
Minkyong Kim, David Kotz, Songkuk Kim