Sciweavers

10044 search results - page 116 / 2009
» Authentication in Wireless Networks
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 5 months ago
High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks
– Hybrid Wireless Mesh Networks are wireless multi-hop networks consisting of two types of nodes, Mesh Routers and Mesh Clients. Mesh Routers are more static and less resource co...
Asad Amir Pirzada, Marius Portmann
TASLP
2008
149views more  TASLP 2008»
14 years 11 months ago
Music Retrieval Over Wireless Ad-Hoc Networks
Wireless networks introduce brand new opportunities for music delivery. The trend of using mobile devices in wireless networks, can significantly extent the recent change of paradi...
Ioannis Karydis, Alexandros Nanopoulos, Apostolos ...
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
15 years 1 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
MOBICOM
2010
ACM
14 years 11 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
IJNSEC
2006
156views more  IJNSEC 2006»
14 years 11 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed