Sciweavers

328 search results - page 3 / 66
» Data Security and wireless networks: mutually exclusive
Sort
View
NDSS
2005
IEEE
13 years 11 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
CORR
2008
Springer
153views Education» more  CORR 2008»
13 years 5 months ago
Efficient and Robust Secure Aggregation for Sensor Networks
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
WISEC
2009
ACM
14 years 2 days ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
TWC
2010
12 years 12 months ago
Rex: A randomized EXclusive region based scheduling scheme for mmWave WPANs with directional antenna
Millimeter-wave (mmWave) transmissions are promising technologies for high data rate (multi-Gbps) Wireless Personal Area Networks (WPANs). In this paper, we first introduce the con...
Lin X. Cai, Lin Cai, Xuemin Shen, Jon W. Mark
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 4 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller