Sciweavers

1463 search results - page 201 / 293
» Securing Wireless Mesh Networks
Sort
View
CSFW
2010
IEEE
15 years 1 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
FC
2007
Springer
152views Cryptology» more  FC 2007»
15 years 4 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 3 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 4 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
DEXAW
2006
IEEE
165views Database» more  DEXAW 2006»
15 years 4 months ago
Design of a Web-Based Application for Wireless Sensor Networks
Wireless sensor networks (WSNs) are used for various ubiquitous and pervasive environments. A few common applications are security, agriculture, automation, and environmental moni...
Sajid Hussain, Nick Schofield, Abdul Wasey Matin