Sciweavers

537 search results - page 41 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
CORR
2010
Springer
60views Education» more  CORR 2010»
14 years 11 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
PERCOM
2009
ACM
15 years 5 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
INFOCOM
2009
IEEE
15 years 5 months ago
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access
—In cognitive wireless networks where secondary users (SUs) opportunistically access spectral white spaces of primary users (PUs), there exists an inherent tradeoff between sensi...
Senhua Huang, Xin Liu, Zhi Ding
INFOCOM
2007
IEEE
15 years 5 months ago
Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
—802.11a, b, and g standards were designed for deployment in cooperative environments, and hence do not include mechanisms to protect from jamming attacks. In this paper, we expl...
Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, Dan...
128
Voted
OPODIS
2004
15 years 7 days ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko