Sciweavers

867 search results - page 132 / 174
» Advanced Wireless LAN
Sort
View
IJNSEC
2007
110views more  IJNSEC 2007»
14 years 9 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
PODC
2009
ACM
15 years 6 months ago
The wireless synchronization problem
In this paper, we study the wireless synchronization problem which requires devices activated at different times on a congested single-hop radio network to synchronize their roun...
Shlomi Dolev, Seth Gilbert, Rachid Guerraoui, Fabi...
MOBISYS
2009
ACM
15 years 10 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
MM
2009
ACM
126views Multimedia» more  MM 2009»
15 years 4 months ago
MOGFUN: musical mObile group for FUN
The computational power and sensory capabilities of mobile devices are increasing dramatically these days, rendering them suitable for real-time sound synthesis and various musica...
Yinsheng Zhou, Zhonghua Li, Dillion Tan, Graham Pe...
INFOCOM
2006
IEEE
15 years 3 months ago
CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs
— Today’s IEEE 802.11 WLANs (Wireless LANs) provide multiple transmission rates so that different rates can be exploited in an adaptive manner depending on the underlying chann...
Jongseok Kim, Seongkwan Kim, Sunghyun Choi, Daji Q...