Sciweavers

10044 search results - page 70 / 2009
» Authentication in Wireless Networks
Sort
View
ITCC
2005
IEEE
15 years 4 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
PERCOM
2006
ACM
15 years 10 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 5 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
MOBIHOC
2001
ACM
15 years 10 months ago
Constructing minimum energy mobile wireless networks
Xiang-Yang Li, Peng-Jun Wan