Sciweavers

119 search results - page 21 / 24
» Secure Localization with Hidden and Mobile Base Stations
Sort
View
87
Voted
IJNSEC
2008
127views more  IJNSEC 2008»
14 years 9 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
ICDS
2009
IEEE
15 years 4 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 2 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
INFOCOM
2010
IEEE
14 years 8 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
JMM2
2007
132views more  JMM2 2007»
14 years 9 months ago
Contour Tracking of Targets with Large Aspect Change
In this paper we present a novel method for tracking contour of a moving rigid object in natural video sequences from a mobile camera. While a mobile camera is keeping track of a m...
Behzad Jamasbi, Seyed Ahmad Motamedi, Alireza Behr...