Sciweavers

1463 search results - page 217 / 293
» Securing Wireless Mesh Networks
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 1 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
IJNSEC
2006
200views more  IJNSEC 2006»
14 years 10 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
IPSN
2010
Springer
15 years 4 months ago
Robust uncorrelated bit extraction methodologies for wireless sensors
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
Jessica Croft, Neal Patwari, Sneha Kumar Kasera
SPW
2000
Springer
15 years 1 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
ICCCN
2007
IEEE
15 years 4 months ago
Performance of 802.11b/g in the Interference Limited Regime
Signal to interference plus noise ratio, SINR, is one of the main factors that affects the quality of wireless communication. While the impact of white Gaussian noise on a wireles...
Vinay Sridhara, Hweechul Shin, Stephan Bohacek