Sciweavers

56 search results - page 7 / 12
» Improving users' security choices on home wireless networks
Sort
View
FC
2007
Springer
152views Cryptology» more  FC 2007»
15 years 3 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
MOBICOM
2005
ACM
15 years 3 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
ICIP
2006
IEEE
15 years 11 months ago
Optimal Unequal Error Protection with User Cooperation for Transmission of Embedded Source-Coded Images
This paper studies the transmission of images encoded using an embedded source encoder over a wireless network allowing user cooperation. A dynamic programming algorithm is applie...
Andres Kwasinski, K. J. Ray Liu
WICOMM
2008
258views more  WICOMM 2008»
14 years 8 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
WWW
2008
ACM
15 years 10 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth