Sciweavers

1412 search results - page 278 / 283
» Medium access control in wireless sensor networks
Sort
View
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 5 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
MOBISYS
2009
ACM
15 years 11 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
CCS
2008
ACM
15 years 1 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
82
Voted
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 5 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...
HICSS
2002
IEEE
150views Biometrics» more  HICSS 2002»
15 years 4 months ago
An Architecture for Location Aware Applications
This paper presents an architecture for location aware applications, where positioning sources such as GPS, WaveLAN and Bluetooth devices can be seamlessly interchanged or even co...
James Nord, Kåre Synnes, Peter Parnes