Sciweavers

10044 search results - page 136 / 2009
» Authentication in Wireless Networks
Sort
View
ICWN
2008
15 years 1 months ago
Reliability Challenges and Enhancement Approaches for Pipeline Sensor and Actor Networks
- Sensor and actor networks are used to monitor and control pipeline infrastructures. This paper discusses and compares different sensor and actor network architectures for water, ...
Nader Mohamed, Imad Jawhar, Khaled Shuaib
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Game-Theoretic Paradigm for Resource Management in Spectrum Agile Wireless Networks
We propose a new way of architecting the wireless multimedia communications systems by jointly optimizing the protocol stack at each station and the resource exchanges among stati...
Fangwen Fu, Ahmad Reza Fattahi, Mihaela van der Sc...
ICPPW
2005
IEEE
15 years 5 months ago
On Channel Adaptive Energy Management in Wireless Sensor Networks
Energy constraints in a wireless sensor network are crucial issues criticallyaffectingthe network lifetime and connectivity. To realize true energysavingin a wireless environment,t...
Xiao-Hui Lin, Yu-Kwong Kwok
AINA
2007
IEEE
15 years 5 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
AINA
2004
IEEE
15 years 3 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...