Sciweavers

10044 search results - page 120 / 2009
» Authentication in Wireless Networks
Sort
View
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 5 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
MDM
2007
Springer
209views Communications» more  MDM 2007»
15 years 5 months ago
Parallelized Simulated Annealing for Model Updating in Ad-Hoc Wireless Sensing Networks
The engineering community has recently begun to adopt wireless sensing technologies for use in many sensing applications. These low-cost sensors provide an optimal setting for den...
Andrew T. Zimmerman, Jerome P. Lynch
IEPOL
2010
107views more  IEPOL 2010»
14 years 10 months ago
On the convergence of wired and wireless access network architectures
Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-...
William H. Lehr, John M. Chapin
SSD
2009
Springer
167views Database» more  SSD 2009»
15 years 5 months ago
Continuous Spatial Authentication
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such app...
Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, ...
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
15 years 12 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky