Sciweavers

1482 search results - page 163 / 297
» Wireless LAN Security
Sort
View
99
Voted
SIGCOMM
1995
ACM
15 years 5 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn
SOSP
2005
ACM
15 years 10 months ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh
142
Voted
ICEIS
2000
IEEE
15 years 6 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
OSDI
2004
ACM
16 years 2 months ago
Deploying Safe User-Level Network Services with icTCP
We present icTCP, an "information and control" TCP implementation that exposes key pieces of internal TCP state and allows certain TCP variables to be set in a safe fash...
Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi...
IPSN
2009
Springer
15 years 8 months ago
Archetype-based design: Sensor network programming for application experts, not just programming experts
Sensor network application experts such as biologists, geologists, and environmental engineers generally have little experience with, and little patience for, general-purpose and ...
Lan S. Bai, Robert P. Dick, Peter A. Dinda