Sciweavers

10044 search results - page 129 / 2009
» Authentication in Wireless Networks
Sort
View
TRIDENTCOM
2010
IEEE
14 years 9 months ago
ASSERT: A Wireless Networking Testbed
Abstract. As wireless networks become a critical part of home, business and industrial infrastructure, researchers will meet these demands by providing new networking technologies....
Ehsan Nourbakhsh, Jeff Dix, Paul Johnson, T. Ryan ...
ICON
2007
IEEE
15 years 5 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
106
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 4 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
MOBIHOC
2008
ACM
15 years 11 months ago
Connectivity in cooperative wireless ad hoc networks
Liaoruo Wang, Benyuan Liu, Dennis Goeckel, Donald ...
67
Voted
MOBIHOC
2006
ACM
15 years 11 months ago
Jamming and sensing of encrypted wireless ad hoc networks
Timothy X. Brown, Jesse E. James, Amita Sethi