Sciweavers

4761 search results - page 685 / 953
» Performance of Protocols
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ISJGP
2007
146views more  ISJGP 2007»
15 years 4 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
SAC
2008
ACM
15 years 4 months ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....
SAC
2008
ACM
15 years 4 months ago
Large-scale simulation of V2V environments
Providing vehicles with enhanced ability to communicate and exchange real-time data with neighboring vehicles opens up a variety of complex challenges that can only be met by comb...
Hugo Conceição, Luís Damas, M...
153
Voted
CCGRID
2005
IEEE
15 years 10 months ago
Scaling NFSv4 with parallel file systems
Large grid installations require global access to massive data stores. Parallel file systems give high throughput within a LAN, but cross-site data transfers lack seamless integra...
Dean Hildebrand, Peter Honeyman