Sciweavers

359 search results - page 20 / 72
» comcom 2008
Sort
View
COMCOM
2004
137views more  COMCOM 2004»
14 years 9 months ago
Security performance of loaded IEEE 802.11b wireless networks
Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b ...
Nilufar Baghaei, Ray Hunt
COMCOM
2004
83views more  COMCOM 2004»
14 years 9 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
COMCOM
2004
96views more  COMCOM 2004»
14 years 9 months ago
Privacy issues in virtual private networks
The term "private" in virtual private network is sometimes taken for granted, and people can be too distracted by the "virtual" and "network" to real...
W. Timothy Strayer
COMCOM
2004
120views more  COMCOM 2004»
14 years 9 months ago
IPsec-based end-to-end VPN deployment over UMTS
Next generation mobile users require flexible security mechanisms, which provide customized security services to data traffic, take into account end-user mobility and mobile netwo...
Christos Xenakis, Lazaros F. Merakos
COMCOM
2000
77views more  COMCOM 2000»
14 years 9 months ago
A location-based mobility tracking scheme for PCS networks
This paper introduces a location-based locating strategy for Personal Communication Services (PCS) systems. In the proposed scheme, location updates are based on the value of a mo...
Zuji Mao, Christos Douligeris