Sciweavers

547 search results - page 58 / 110
» Analysis of a mobile communication security protocol
Sort
View
PASTE
2010
ACM
15 years 6 months ago
Opportunities for concurrent dynamic analysis with explicit inter-core communication
Multicore is now the dominant processor trend, and the number of cores is rapidly increasing. The paradigm shift to multicore forces the redesign of the software stack, which incl...
Jungwoo Ha, Stephen P. Crago
INFOCOM
2011
IEEE
14 years 5 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi
101
Voted
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 2 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
ICC
2007
IEEE
160views Communications» more  ICC 2007»
15 years 8 months ago
IEEE 802.11-Based Mobile IP Fast Handoff Latency Analysis
— Mobile IP is a solution for mobility support in the global Internet. However, it suffers from long handoff delay. Many solutions have been proposed to reduce the handoff delay ...
Jiang Xie, Ivan Howitt, Izzeldin Shibeika
136
Voted
MOBICOM
2000
ACM
15 years 6 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson