Sciweavers

4985 search results - page 308 / 997
» Re-Configurable Computing in Wireless
Sort
View
ICDCS
2005
IEEE
15 years 10 months ago
On Flow Marking Attacks in Wireless Anonymous Communication Networks
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...
PEWASUN
2005
ACM
15 years 10 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
SAC
2005
ACM
15 years 10 months ago
Reflective middleware for wireless sensor networks
Wireless Sensor Networks (WSNs) are distributed systems whose main goal is to collect and deliver data to applications. This paper proposes a reflective, service-oriented middlewa...
Flávia Coimbra Delicato, Paulo F. Pires, Lu...
MOBIHOC
2003
ACM
15 years 10 months ago
Improving fairness among TCP flows crossing wireless ad hoc and wired networks
In scenarios where wireless ad hoc networks are deployed, sometimes it would be desirable that ad hoc nodes can communicate with servers in wired networks to upload or download da...
Luqing Yang, Winston Khoon Guan Seah, Qinghe Yin
NDSS
2002
IEEE
15 years 9 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...