End-to-End Security Across Wired-Wireless Networks for Mobile Users.
Sherali ZeadallyNicolas SklavosMoganakrishnan RathakrishnanScott FowlerPublished in: Inf. Secur. J. A Glob. Perspect. (2007)
Keyphrases
- end to end
- wireless networks
- mobile users
- wireless networking
- mobile computing
- wired networks
- cellular networks
- wireless ad hoc networks
- multimedia services
- mobile networks
- ad hoc networks
- wireless communication
- base station
- mobile phone
- multi hop
- mobile devices
- wifi
- transport layer
- access points
- context aware
- congestion control
- multipath
- internet access
- network security
- mobile services
- mobile applications
- physical layer
- high bandwidth
- location based services
- cross layer
- wireless technologies
- intrusion detection
- rate allocation
- scalable video
- mobile agents
- information sources
- qos requirements
- service delivery
- ip networks
- mobility management
- security policies
- mobile technologies