Sciweavers

244 search results - page 3 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
JCM
2006
126views more  JCM 2006»
13 years 5 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
IJSNET
2007
115views more  IJSNET 2007»
13 years 5 months ago
Implementation and performance evaluation of nanoMAC: a low-power MAC solution for high density wireless sensor networks
: This paper describes the implementation architecture and performance analysis of nanoMAC, a CSMA/CA based medium access control protocol, which is specifically designed for high...
Junaid Ansari, Janne Riihijärvi, Petri Mä...
ASAP
2006
IEEE
138views Hardware» more  ASAP 2006»
13 years 9 months ago
Configurable, High Throughput, Irregular LDPC Decoder Architecture: Tradeoff Analysis and Implementation
Low Density Parity Check (LDPC) codes are one of the best error correcting codes that enable the future generations of wireless devices to achieve higher data rates. This paper pr...
Marjan Karkooti, Predrag Radosavljevic, Joseph R. ...
CHI
2008
ACM
14 years 6 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
GLOBECOM
2009
IEEE
14 years 15 days ago
Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
Konstantinos Pelechrinis, Iordanis Koutsopoulos, I...