Other on-line Course related Material

An example of a paper from the course that became a conference paper:
Flutra Osmani and Adriaan Slabbert, A scalable distributed security infrastructure for industrial control and sensor networks, Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC '09, ACM, New York, NY, USA, 2009, ISBN 978-1-60558-569-7, 84-89, DOI: http://doi.acm.org/10.1145/1582379.1582399,

An example of an excellent paperon IEEE 802.21 ( Download A.Makris-WMNA-20080618.pdf 

), it appears here with permission of the author.

An example of an outstanding paper on Intrusion Detection in Wireless Sensor Networks ( Download Andreas_Strikos-paper-20070301.pdf

), it appears here with permission of the author.

An example of an outstanding paper on imode ( Download 2g1330-Ludovic_Copere-imode-20040603.pdf

), it appears here with permission of the author.

An example of a paper examing the much lower layer issues of Handover Considerations in the Design of Multi-Standard Transceiver Front Ends ( Download Jad_Atallah_report_revised-20040625.pdf

), it appears here with permission of the author.

Another example paper: Wireless VPN: IPSec vs. SSL/TLS ( Download 2G1330_asa_pehrsson-20050712.pdf

) by Åsa Pehrson. It appears here with permission of the author.

An example of a paper examining multimedia messaging is that of Max Loubser, " User created content with MMS"( Download 2G1330_Max_Loubser_MMS-20050731.pdf

), it appears here with permission of the author.

An example of a paper and slides from the oral presentation (on 2006.03.14) concerning bypassing access control in semi-open wireless networks. The link to this paper appears with permission of the author.