Sciweavers

11217 search results - page 1852 / 2244
» Network Coding for Wireless Networks
Sort
View
CBSE
2011
Springer
14 years 4 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
PERCOM
2009
ACM
16 years 4 months ago
High Accuracy Context Recovery using Clustering Mechanisms
This paper examines the recovery of user context in indoor environments with existing wireless infrastructures to enable assistive systems. We present a novel approach to the extra...
Dinh Q. Phung, Brett Adams, Kha Tran, Svetha Venka...
PERCOM
2009
ACM
16 years 4 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
PERCOM
2006
ACM
16 years 3 months ago
A Keystroke and Pointer Control Input Interface for Wearable Computers
The widespread adoption of mobile electronic devices and the advent of wearable computing has encouraged the development of compact alternatives to the keyboard and mouse. These i...
Farooq Ahmad, Petr Musílek
PERCOM
2005
ACM
16 years 3 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
« Prev « First page 1852 / 2244 Last » Next »