Sciweavers

3483 search results - page 641 / 697
» Forward
Sort
View
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 1 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
WCNC
2010
IEEE
15 years 1 months ago
Many-To-Many Communications via Space-Time Network Coding
—In this paper, the mutual cooperative communication between multiple nodes in a wireless network is efficiently achieved through a novel concept of Space-Time Network Coding (S...
Mohammed W. Baidas, Hung-Quoc Lai, K. J. Ray Liu
GLOBECOM
2007
IEEE
15 years 1 months ago
S-OSPF: A Traffic Engineering Solution for OSPF Based Best Effort Networks
Open Shortest Path First (OSPF) is one of the most widely used intra-domain routing protocol. It is well known that OSPF protocol does not provide flexibility in terms of packet fo...
Aditya Kumar Mishra, Anirudha Sahoo
GLOBECOM
2009
IEEE
15 years 1 months ago
Multi-User Cooperative Communications with Relay-Coding for Uplink IMT-Advanced 4G Systems
Adoption of relay stations has been commonly accepted as a key technique for future IMTadvanced 4G systems to improve the link performance. While study in relay systems is often c...
Lei Cao, Jinyun Zhang, Norio Kanno
ACSC
2004
IEEE
15 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald