Sciweavers

10044 search results - page 70 / 2009
» Authentication in Wireless Networks
Sort
View
236
Voted
ITCC
2005
IEEE
15 years 9 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
125
Voted
PERCOM
2006
ACM
16 years 3 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
135
Voted
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 10 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
117
Voted
MOBIHOC
2001
ACM
16 years 3 months ago
Constructing minimum energy mobile wireless networks
Xiang-Yang Li, Peng-Jun Wan