Sciweavers

628 search results - page 27 / 126
» WI - Dissertationen
Sort
View
126
Voted
IWDW
2005
Springer
15 years 9 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
131
Voted
WMASH
2004
ACM
15 years 9 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
123
Voted
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
15 years 8 months ago
Resource sharing optimality in WiFi infrastructure networks
Abstract— In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this...
Laura Giarré, Giovanni Neglia, Ilenia Tinni...
122
Voted
IJCAI
2007
15 years 5 months ago
WiFi-SLAM Using Gaussian Process Latent Variable Models
WiFi localization, the task of determining the physical location of a mobile device from wireless signal strengths, has been shown to be an accurate method of indoor and outdoor l...
Brian Ferris, Dieter Fox, Neil D. Lawrence
115
Voted
IJSNET
2008
126views more  IJSNET 2008»
15 years 3 months ago
Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks
: Interference from colocated networks operating over the same frequency range, becomes an increasingly severe problem as the number of networks overlapping geographically increase...
Razvan Musaloiu-Elefteri, Andreas Terzis