Sciweavers

66 search results - page 3 / 14
» Secure Location Verification Using Radio Broadcast
Sort
View
CORR
2008
Springer
166views Education» more  CORR 2008»
13 years 5 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
SUTC
2010
IEEE
13 years 9 months ago
Link Scheduling in a Single Broadcast Domain Underwater Networks
Because radio waves decay rapidly in sea water, acoustic communication is the most popular choic for underwater sensor networks. However, since the propagation speed of acoustic w...
Pai-Han Huang, Ying Chen, Bhaskar Krishnamachari, ...
PEWASUN
2004
ACM
13 years 10 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
JSAC
2008
199views more  JSAC 2008»
13 years 5 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
ITCC
2005
IEEE
13 years 10 months ago
A Toolkit for Automatically Constructing Outdoor Radio Maps
Outdoor location systems based on Wireless Access Point (WAP) signal strength must either know the exact location of the WAPs in order to use a triangulation algorithm, or must co...
Kay Connelly, Yong Liu, Dan Bulwinkle, Adam Miller...