Other on-line Course related Material
An example of a paper from the course that became a conference paper:
Flutra Osmani and Adriaan Slabbert, A scalable distributed security infrastructure for industrial control and sensor networks, Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC '09, ACM, New York, NY, USA, 2009, ISBN 978-1-60558-569-7, 84-89, DOI: http://doi.acm.org/10.1145/1582379.1582399,
An example of an excellent paperon IEEE 802.21 (A.Makris-WMNA-20080618.pdf Download A.Makris-WMNA-20080618.pdf ), it appears here with permission of the author.
An example of an outstanding paper on Intrusion Detection in Wireless Sensor Networks (Andreas_Strikos-paper-20070301.pdf Download Andreas_Strikos-paper-20070301.pdf), it appears here with permission of the author.
An example of an outstanding paper on imode (2g1330-Ludovic_Copere-imode-20040603.pdf Download 2g1330-Ludovic_Copere-imode-20040603.pdf), it appears here with permission of the author.
An example of a paper examing the much lower layer issues of Handover Considerations in the Design of Multi-Standard Transceiver Front Ends (Jad_Atallah_report_revised-20040625.pdf Download Jad_Atallah_report_revised-20040625.pdf), it appears here with permission of the author.
Another example paper: Wireless VPN: IPSec vs. SSL/TLS (2G1330_asa_pehrsson-20050712.pdf Download 2G1330_asa_pehrsson-20050712.pdf) by Åsa Pehrson. It appears here with permission of the author.
An example of a paper examining multimedia messaging is that of Max Loubser, " User created content with MMS"(2G1330_Max_Loubser_MMS-20050731.pdf Download 2G1330_Max_Loubser_MMS-20050731.pdf), it appears here with permission of the author.
An example of a paper and slides from the oral presentation (on 2006.03.14) concerning bypassing access control in semi-open wireless networks. The link to this paper appears with permission of the author.