The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
— With the increasing number of wireless devices, the importance of mobility management in future mobile networks is growing. In addition, the number of access technologies avail...
Ramy Farha, Khashayar Khavari, Alberto Leon-Garcia
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
— In this paper, we introduce a new approach to location estimation where, instead of locating a single client, we simultaneously locate a set of wireless clients. We present a B...
David Madigan, E. Einahrawy, R. P. Martin, Wen-Hua...