Sciweavers

10044 search results - page 222 / 2009
» Authentication in Wireless Networks
Sort
View
TON
2008
134views more  TON 2008»
15 years 5 months ago
Efficient broadcasting using network coding
Abstract-- We consider the problem of broadcasting in an adhoc wireless network, where all nodes of the network are sources that want to transmit information to all other nodes. Ou...
Christina Fragouli, Jörg Widmer, Jean-Yves Le...
ACSAC
2005
IEEE
15 years 11 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
IEEESP
2006
130views more  IEEESP 2006»
15 years 5 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
HUC
2010
Springer
15 years 4 months ago
UBI challenge workshop 2010: real world urban computing
This workshop promotes ubiquitous computing research in authentic urban setting, with real users and with sufficient scale and time span. We first motivate why such research is im...
Timo Ojala, Jukka Riekki
SENSYS
2009
ACM
16 years 7 days ago
Wireless link simulations using multi-level Markov models
Ankur Kamthe, Miguel Á. Carreira-Perpi&ntil...