Sciweavers

85 search results - page 1 / 17
» Investigation of Signal and Message Manipulations on the Wir...
Sort
View
ESORICS
2011
Springer
12 years 4 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
IPPS
2007
IEEE
13 years 10 months ago
On the Security of Ultrasound as Out-of-band Channel
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication ba...
Rene Mayrhofer, Hans Gellersen
TDSC
2008
99views more  TDSC 2008»
13 years 4 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
ICASSP
2011
IEEE
12 years 8 months ago
Optimal wireless networks based on local channel state information
We consider distributed algorithms to optimize random access multihop wireless networks in the presence of fading. Since the associated optimization problem is neither convex nor ...
Yichuan Hu, Alejandro Ribeiro
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 4 months ago
Delay-rate tradeoff for ergodic interference alignment in the Gaussian case
In interference alignment, users sharing a wireless channel are each able to achieve data rates of up to half of the non-interfering channel capacity, no matter the number of users...
Joseph C. Koo, William Wu, John T. Gill III