Sciweavers

2234 search results - page 55 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
AQUILEIA
2011
142views more  AQUILEIA 2011»
13 years 11 months ago
Integrated Geophysical Study of Archaeological Sites in the Aquileia Area
Abstract. Integrated remote sensing and geophysical methods can provide detailed information about buried cultural heritage. We implemented an integrated survey protocol (IREGA, In...
Emanuele Forte, Michele Pipan, Monica Sugan
ACSAC
2005
IEEE
15 years 4 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
JSAC
2006
120views more  JSAC 2006»
14 years 11 months ago
A Tutorial on Cross-Layer Optimization in Wireless Networks
This tutorial paper overviews recent developments in optimization-based approaches for resource allocation problems in wireless systems. We begin by overviewing important results i...
Xiaojun Lin, Ness B. Shroff, R. Srikant
TMC
2010
137views more  TMC 2010»
14 years 6 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
ESORICS
2012
Springer
13 years 1 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...