Sciweavers

336 search results - page 47 / 68
» Mobile values, new names, and secure communication
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICC
2000
IEEE
15 years 2 months ago
Adaptive Interleaving for OFDM in TDD Systems
We proposed a novel interleaving technique, namely ada,ptive interleaving, which can break the bursty channel errors more effectively than traditional block interleaving. This new...
S. W. Lei, Vincent K. N. Lau, Tung-Sang Ng
GLOBECOM
2010
IEEE
14 years 7 months ago
Finding and Mending Barrier Gaps in Wireless Sensor Networks
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to de...
Anwar Saipulla, Benyuan Liu, Jie Wang
129
Voted
JIPS
2010
462views more  JIPS 2010»
14 years 4 months ago
Challenges to Next Generation Services in IP Multimedia Subsystem
The trend of Next Generation Networks' (NGN) evolution is towards providing multiple and multimedia services to users through ubiquitous networks. The aim of IP Multimedia Sub...
Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han...
IPCCC
2006
IEEE
15 years 3 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood