Sciweavers

54 search results - page 4 / 11
» On the Secure Degrees of Freedom of Wireless X Networks
Sort
View
PERCOM
2010
ACM
13 years 4 months ago
HIP: Health integration platform
—This paper introduces a new software development platform specifically designed for wireless health applications. Wireless health applications follow a unique paradigm encompas...
Jonathan Woodbridge, Hyduke Noshadi, Ani Nahapetia...
WCNC
2010
IEEE
13 years 9 months ago
Experiences and Lessons from Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator
—We describe our experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of th...
Yuri Tselishchev, Athanassios Boulis, Lavy Libman
MOBISYS
2009
ACM
14 years 6 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
PERCOM
2005
ACM
14 years 5 months ago
Securing Wireless Networks in a University Environment
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Jochen Eisinger, Peter Winterer, Bernd Becker
ICASSP
2008
IEEE
14 years 7 days ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig