Sciweavers

10044 search results - page 159 / 2009
» Authentication in Wireless Networks
Sort
View
VTC
2006
IEEE
118views Communications» more  VTC 2006»
15 years 5 months ago
NASC: Network-Aware Source Coding for Wireless Broadcast Channels with Multiple Sources
In this paper, we present a network-aware source coding (NASC) approach for wireless broadcast channels with multiple sources. The proposed NSAC approach takes into account the in...
Fulu Li
EUC
2005
Springer
15 years 5 months ago
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
WD
2010
14 years 9 months ago
Sender- and receiver-centered interference in wireless ad hoc networks
Energy consumption in general and interference in particular are among the most critical issues in wireless networks. In this paper we present the E-BUM calculus, a Energy-aware ca...
Lucia Gallina, Sabina Rossi
87
Voted
SIGCOMM
2009
ACM
15 years 6 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
ACSAC
2007
IEEE
15 years 6 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist