Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeroen van Bemmel is active.

Publication


Featured researches published by Jeroen van Bemmel.


international conference on communications | 2004

An Architecture for User Location in Heterogeneous Mobile Networks

Maarten Wegdam; Jeroen van Bemmel; Ko Lagerberg; Peter Leijdekkers

Fourth generation mobile networks will allow end-users to roam over different network technologies, such as UMTS, CDMA2000 and Wi-Fi. These mobile networks make it possible to determine the location of the mobile terminal, which can be used by applications to provide enhanced services. Each mobile network technology has its specific way to determine the terminal’s location, and to provide this information to the end-user or mobile application. Mobile application developers should not be exposed to the peculiarities of the different network technologies, and should be offered a network technology independent API to obtain user location information. In this paper we propose an architecture that provides 3rd party mobile application developers with a secure API to obtain the user’s location over heterogeneous networks that are managed by different parties. The proposed architecture is validated by a proof- of-concept implementation using UMTS and Wi-Fi networks.


Bell Labs Technical Journal | 2005

Authentication across heterogeneous networks

Miroslav Zivkovic; Milind M. Buddhikot; Ko Lagerberg; Jeroen van Bemmel

In the beyond third-generation (3G) vision, the convergence of different access network technologies is realized and end-user devices are able to roam seamlessly among them. Seamless roaming requires authentication to a network, which may require interaction with an end user that results in the termination of ongoing service sessions and, therefore, inhibits seamless roaming. Furthermore, some access technologies may support a plethora of authentication protocols, making selection of the appropriate method(s) of authentication challenging for an end user. We propose a solution involving single sign-on authentication that allows the end user to roam between different administrative domains and access network technologies (e.g., wireline and wireless). Our solution integrates a number of authentication mechanisms and does not require any end-user interactions while roaming, thus enabling a seamless roaming experience. We describe a prototype implementation of this solution using General Packet Radio Service (GPRS)/Universal Mobile Telecommunications System (UMTS∗)/wireless local area network (WLAN) networks and present our conclusions using measurements on this prototype.


Archive | 2006

Method and apparatus for SIP message prioritization

Harold J. Batteram; Hendrik B. Meeuwissen; Jeroen van Bemmel


Archive | 2007

Distributing load of requests from clients over multiple servers

Jeroen van Bemmel


Archive | 2007

Mobile reality gaming

Jeroen van Bemmel


Archive | 2005

Authenticating a user of a communication device to a wireless network to which the user is not associated with

Jacco Brok; Jeroen van Bemmel


Archive | 2007

Method and Apparatus for Preventing Internet Phishing Attacks

Jeroen van Bemmel


Archive | 2005

Selecting a hidden network to connect a user to a wireless local area network

Jacco Brok; Jeroen van Bemmel


Archive | 2004

Method, apparatus and network architecture for enforcing security policies using an isolated subnet

Jeroen van Bemmel


Archive | 2004

Method, apparatus and system for enforcing security policies

Jeroen van Bemmel; Jacco Brok

Collaboration


Dive into the Jeroen van Bemmel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge