Sciweavers

Share
TMC
2012
7 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ICUMT
2009
9 years 5 months ago
On the adaptivity of today's Energy-Efficient MAC protocols under varying traffic conditions
Energy efficiency is a major concern in the design of Wireless Sensor Networks (WSNs) and their communication protocols. As the radio transceiver typically accounts for a major por...
Philipp Hurni, Torsten Braun
books