Mobile Networks and Information security

Recent Submissions

  • Data Integrity Mechanism Using Hashing Verification 

    Hamamreh, Rushdi A.; Jamoos, Mohammed A. (2014-09-20)
    In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values ...
  • Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication 

    Hamamreh, Rushdi A.; Melhem, Anas M. (2011-02-02)
    Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this ...
  • SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication 

    Hamamreh, Rushdi A.; Melhem, Anas M. (2011-01-06)
    Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a ...