Sciweavers

10044 search results - page 102 / 2009
» Authentication in Wireless Networks
Sort
View
SAINT
2002
IEEE
15 years 4 months ago
Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoE
This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. W...
Hideo Masuda, Michio Nakanishi, Masahide Nakamura,...
ALGOSENSORS
2009
Springer
15 years 6 months ago
Key Levels and Securing Key Predistribution against Node Captures
Jacek Cichon, Jaroslaw Grzaslewicz, Miroslaw Kutyl...
79
Voted
USENIX
2003
15 years 20 days ago
Building a Wireless Community Network in the Netherlands
With the development of low cost hardware for wireless networking based on IEEE 802.11b, wireless networks are an emerging technology. Using these wireless techniques outdoors it ...
Rudi van Drunen, Dirk-Willem van Gulik, Jasper Koo...
ISCAS
2002
IEEE
94views Hardware» more  ISCAS 2002»
15 years 4 months ago
Minimum power broadcast trees for wireless networks: optimizing using the viability lemma
Wireless multicast/broadcast sessions, unlike wired networks, inherently reaches several nodes with a single transmission. For omnidirectional wireless broadcast to a node, all no...
Robert J. Marks II, Arindam Kumar Das, Mohamed A. ...