Sciweavers

291 search results - page 54 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 3 months ago
Impact of Noisy Carrier Phase Synchronization on Linear Amplify-and-Forward Relaying
—We consider a distributed wireless network where amplify-and-forward relays assist the communication between multiple source/destination pairs. To provide a global phase referen...
Stefan Berger, Armin Wittneben
COMCOM
2008
91views more  COMCOM 2008»
14 years 9 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
MOBIHOC
2004
ACM
15 years 9 months ago
Towards mobility as a network control primitive
In the near future, the advent of large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be upon us. However, using controlle...
David Kiyoshi Goldenberg, Jie Lin, A. Stephen Mors...
95
Voted
IWCMC
2009
ACM
15 years 4 months ago
I-PMIP: an inter-domain mobility extension for proxy-mobile IP
Proxy Mobile IP (PMIP) provides a solution for networkbased localized mobility management which in contrast to host-based mobility solutions, like Mobile IP (MIP), does not requir...
Niklas Neumann, Jun Lei, Xiaoming Fu, Gong Zhang
84
Voted
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 2 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...