Sciweavers

267 search results - page 34 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 1 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
MOBICOM
1999
ACM
15 years 6 months ago
Next Century Challenges: RadioActive Networks
A key challenge facing wireless networking is to utilize the spectrum as e ciently as possible given current channel conditions and in the most e ective way for each application. ...
Vanu G. Bose, David Wetherall, John V. Guttag
MOBIHOC
2012
ACM
13 years 4 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
ESORICS
2009
Springer
15 years 8 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
PERCOM
2003
ACM
16 years 1 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...