Sciweavers

10044 search results - page 213 / 2009
» Authentication in Wireless Networks
Sort
View
SAC
2009
ACM
15 years 9 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
PERCOM
2010
ACM
15 years 2 months ago
HIP: Health integration platform
—This paper introduces a new software development platform specifically designed for wireless health applications. Wireless health applications follow a unique paradigm encompas...
Jonathan Woodbridge, Hyduke Noshadi, Ani Nahapetia...
PERCOM
2011
ACM
14 years 8 months ago
Inference attacks by third-party extensions to social network systems
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
ICWN
2008
15 years 5 months ago
Behavior of Bluetooth Bridging Nodes within an Adaptive Service Providing Environment
In order to demonstrate our research results on managing wireless networks that are used to provide mobile services with a large spectrum of application, we developed the BlueSpot ...
Ulrich Dümichen, Uwe Baumgarten
GLOBECOM
2007
IEEE
15 years 10 months ago
A Novel Distributed Scheduling Algorithm for Wireless Mesh Networks
— Wireless multi-hop, mesh networks are being considered as a candidate to backhaul data traffic from access networks to the wired Internet. These mesh networks are referred to a...
Yun Hou, Kin K. Leung