Sciweavers

244 search results - page 2 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
TON
2010
189views more  TON 2010»
12 years 12 months ago
Analysis, Simulation, and Implementation of VCP: A Wireless Profiling
Abstract--Every congestion control protocol operating in wireless networks is potentially faced with two major challenges of performance degradation. These sources are (a) the coup...
Xiaolong Li, Homayoun Yousefi'zadeh
VLSISP
2008
118views more  VLSISP 2008»
13 years 5 months ago
Analysis of Lifting and B-Spline DWT Implementations for Implantable Neuroprosthetics
Abstract. The large amount of data generated by neuroprosthetic devices requires a high communication bandwidth for extra-cranial transmission, critically limiting the number and u...
Awais M. Kamboh, Andrew Mason, Karim G. Oweiss
WISEC
2010
ACM
13 years 10 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
13 years 11 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
SIGMETRICS
2008
ACM
128views Hardware» more  SIGMETRICS 2008»
13 years 5 months ago
Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation
Local network coding is growing in prominence as a technique to facilitate greater capacity utilization in multi-hop wireless networks. A specific objective of such local network ...
Shravan K. Rayanchu, Sayandeep Sen, Jianming Wu, S...