Filters








60 Hits in 8.8 sec

Authenticated wireless roaming via tunnels

Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
2009 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09  
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network.  ...  Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security challenges on authentication and key establishment, as the goal is not only to protect the end-to-end  ...  Authenticated Wireless Roaming via Tunnels: Making Mobile Feel at Home 7 -RevealKey(P, s): Authenticated Wireless Roaming via Tunnels: Making Mobile Feel at Home 9 -Case P = F: A asks RevealTunnelKey  ... 
doi:10.1145/1533057.1533072 dblp:conf/ccs/ManulisLKBQ09 fatcat:pprrnol2urhq5igbzcpazxawr4

Architecting Citywide Ubiquitous Wi-Fi Access

Nishanth Sastry, Jon Crowcroft, Karen R. Sollins
2007 ACM Workshop on Hot Topics in Networks  
. * Currently a visiting student at MIT CSAIL.  ...  Using tunneling as a primitive, we show how to architect a citywide cooperative for safely sharing Wi-Fi with legitimate guests.  ...  The host end of the tunnel only allows packets destined to the home, and the VPN server at the home end authenticates the guest.  ... 
dblp:conf/hotnets/SastryCS07 fatcat:utkt27cf4fh5reizjljnc6qbpm

Enhancement of a WLAN-based internet service in Korea

Youngkyu Choi, Jeongyeup Paek, Sunghyun Choi, Go Woon Lee, Jae Hwan Lee, Hanwook Jung
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
A wireless LAN (WLAN)-based Internet service, called NESPOT, of Korea Telecom (KT), the biggest telecommunication and Internet service company in Korea, has been operational since early 2002.  ...  Roaming and Resource Management Along with the interworking with another wireless system discussed above, the roaming across WLAN APs is another important issue.  ...  This system will operate at a licensed 2.3 GHz band. This new portable Internet system is targeted at a wireless service of 1~2 Mbps per user with a low and medium mobility (up to 60 km/h speed).  ... 
doi:10.1145/941326.941333 dblp:conf/wmash/ChoiPCLLJ03 fatcat:6phj3ikio5esffhwbpjygdjbby

Enhancement of a WLAN-based internet service in Korea

Youngkyu Choi, Jeongyeup Paek, Sunghyun Choi, Go Woon Lee, Jae Hwan Lee, Hanwook Jung
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
A wireless LAN (WLAN)-based Internet service, called NESPOT, of Korea Telecom (KT), the biggest telecommunication and Internet service company in Korea, has been operational since early 2002.  ...  Roaming and Resource Management Along with the interworking with another wireless system discussed above, the roaming across WLAN APs is another important issue.  ...  This system will operate at a licensed 2.3 GHz band. This new portable Internet system is targeted at a wireless service of 1~2 Mbps per user with a low and medium mobility (up to 60 km/h speed).  ... 
doi:10.1145/941332.941333 fatcat:2ussrlxldrhx3hhd3t23dadmzy

Enhancement of a WLAN-Based Internet Service

Youngkyu Choi, Sekyu Park, Sunghyun Choi, Go Woon Lee, Jaehwan LEE, Hanwook Jung
2005 Journal on spesial topics in mobile networks and applications  
This system will operate at a licensed 2.3 GHz band. This new portable Internet system is targeted at a wireless service of 1~2 Mbps per user with a low and medium mobility (up to 60 km/h speed).  ...  Roaming and Resource Management Along with the interworking with another wireless system discussed above, the roaming across WLAN APs is another important issue.  ... 
doi:10.1007/s11036-005-6424-2 fatcat:xxvk54ohkzcnlfhp3mtqdgw5ge

VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins

Avinash Srinivasan, Jie Wu
2018 International Journal of Security and Networks (IJSN)  
to support rudimentary low-level authentication at the link layer enabling an AP to decide whether to allow a client to associate.  ...  VOUCH-AP makes use of a modified version of a X.509 digital certificate consisting of additional fields for provisioning robust security and privacy to counter evil-twin attacks.  ...  for the VPN tunnel.  ... 
doi:10.1504/ijsn.2018.10014324 fatcat:ln7ua3hayfgxnohmvibomzqxum

D1.4 - Final Report On System Requirements And Architecture

Pavle Skočir, Ivana Podnar Žarko, Konstantinos Katsaros, Matteo Pardi, Matteo Di Fraia, Gabriel Kovacs, João Garcia, Szymon Mueller, Joaquin Iranzo, Mikołaj Dobski, Nemanja Ignjatov, Pietro Tedeschi (+1 others)
2017 Zenodo  
It also maintains records about platform roaming resources in Smart Spaces (comparable to Home Location Register in mobile networks).  ...  Note that a platform chooses which resources it wants to register and make discoverable via the symbIoTe Core Services.  ...  The next planned step for Symphony is to include energy management options and become highly distributed on a variety of hosting systems (e.g. domestic NAS or micro servers hosted at home or at providers  ... 
doi:10.5281/zenodo.830156 fatcat:y4o6yvfyd5dozo7qy2itb7s4ye

D5.4 - Integrated Prototype and Developed Applications

Ilia Pietri, Vasilis Glykantzis, Gerhard Duennebeil, Karl Kreiner, Christoph Ruggenthaler, Petar Krivic, Ivana Podnar Zarko, Pavle Skocir, Matteo Pardi, Luca Tomaselli, Luca De Santis, Michael Jacoby (+12 others)
2018 Zenodo  
BLE beacons are scanned by using Altbeacon library, while WiFi information is collected via WiFiManager library and mobile base station data via TelephonyManager library.  Global, Specific and Sybolic  ...  tokens o Platform management o User management 1.0.0  L1 compliance release  Certificate issuing  Token acquisition (GUEST, HOME, FOREIGN)  User Details acquisition  Local attributes management  ...  Most of the use cases utilize IoT platforms at L1 and L2 compliance levels, while Smart Residence and Smart Yachting use case scenarios also make use of the symbIoTe platform L3 and L4 functionality.  ... 
doi:10.5281/zenodo.1341102 fatcat:pb72eix3fvavxmscgohsb6yfpe

Towards IPV6 Adoption in Developing Arab Countries in Western Asia Region

Baha Khasawneh, Batool AlArmouty
2019 International Journal of Technology and Engineering Studies  
Directories and authentication services Directories are a service commonly used at academic organizations, as they allow accessing different information regarding the persons that make up the organization  ...  Mobility As already mentioned, mobility is a very common feature among researchers and teachers.  ... 
doi:10.20469/ijtes.5.40004-2 fatcat:iqgvz6bilveplj2yetf7to37l4

Approaches for simplified hotspot logins with Wi-Fi devices

Patrick Wiederkehr
2009
The thesis concludes with an evaluation of the different approaches for hotspot authentication.  ...  Today, public hotspots are not as secure as they could be if they implemented current standards and protocols for secure wireless networking.  ...  This would make it almost impossible to have roaming agreements with several operators at the same time, and makes it very costly to add new partners to the list.  ... 
doi:10.3929/ethz-a-005899210 fatcat:d2jpkhkoufhprppctw5w4bmqey

Multiple Dimensions of Community Network Scalability [chapter]

Roger Baig-Viñas, Leandro Navarro, Ramon Roca-i-Tio
2019 Zenodo  
between towers), and inter-network mobility (i.e. roaming).  ...  at a restaurant and eating at home.  ... 
doi:10.5281/zenodo.2560603 fatcat:iox3mfxejzbm3pslqrcirwf5la

Abstract of Doctoral Dissertation

1977 The Financial Review  
At their best, they enable businesses, but too often they also harm useful activities. I conclude business drivers and hurdles that are important from the legal point of view.  ...  Telecom operators have agreed upon seamless roaming of mobile services all over Europe, as they see it in their interests to boost traffic on mobile networks.  ...  A person at work, at home, at leisure activities, and so on has many roles that should be distinguished.  ... 
doi:10.1111/j.1540-6288.1977.tb00954.x fatcat:ytm3zbtttjft5euxe4qwiu3lui

USER-CHI project - D8.8: Business model validation results

Gabriele Pistilli, Fabio Cartolano
2022 Zenodo  
Stations; BM3 –City centre (park & charge); BM4 – E-trucks; BM5 – E-taxis stops; BM6 – Special events; BM7 – Mobile charging stations.  ...  The Deliverable 8.8 outlines in a first release the elements driving and characterising the electromobility market in seven different Business Models (BMs): BM1 – Logistics hubs; BM2 – Citizens e-Mobility  ...  work as at home).  ... 
doi:10.5281/zenodo.6921821 fatcat:jksyzjve35eehlz7yguc4qc7le

I-centric Communications

S. Arbanowski, S. van der Meer, S. Steglich, R. Popescu-Zeletin
2001 Informatik - Forschung und Entwicklung  
Nevertheless, these aspects have been analyzed by Stephan Steglich, researcher at the TUB, in a second PhD thesis in parallel.  ...  Looking at the communication behavior of human, it is obvious, that human beings frequently interact with a set of objects in their environment.  ...  The VHE is based on standardized service capabilities and personalized features that are consistently presented so that the user always 'feels' that he is on his home network even when roaming across network  ... 
doi:10.1007/s004500100087 fatcat:eefvlrm6lvf2vhnxn5sk3lhhqu

English Section Vol. 22 No. 1, January 2021

2021 مجلة البحث العلمی فی الآداب  
The idea is to bring music into the home by wireless" (Qtd. in Maltin 2).  ...  , all appear on the screen and hundreds of guests logged on from their homes to attend the wedding (Rai 2020).  ...  , which leads to a new way to look at the genre of speculative/science fiction.  ... 
doi:10.21608/jssa.2021.161111 fatcat:n7xr24c5jnekhm3xq27b6uvwqa
« Previous Showing results 1 — 15 out of 60 results