Sciweavers

10044 search results - page 203 / 2009
» Authentication in Wireless Networks
Sort
View
MOBIHOC
2005
ACM
15 years 9 months ago
'Openness' and the public airwaves
Sascha D. Meinrath, Victor Bahl, Kenneth R. Carter...
IPSN
2005
Springer
15 years 9 months ago
Experiences and directions in pushpin computing
— Over the last three years we have built and experimented with the Pushpin Computing wireless sensor network platform. The Pushpin platform is a tabletop multihop wireless senso...
Joshua Lifton, Michael Broxton, Joseph A. Paradiso
JCM
2007
191views more  JCM 2007»
15 years 4 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
COMSWARE
2006
IEEE
15 years 10 months ago
FACTS - A rule-based middleware architecture for wireless sensor networks
ing a middleware abstraction layer into wireless sensor networks is a widely accepted solution to facilitate application programming and allow network organization. In this paper,...
Kirsten Terfloth, Georg Wittenburg, Jochen H. Schi...