Sciweavers

1259 search results - page 171 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
WMTE
2008
IEEE
14 years 2 months ago
Context-Aware Writing in Ubiquitous Learning Environments
With the popularization of the wireless network, and the progress of mobile computing technology, the efficiency of the hand-held device is better, and its applications are wider....
Tzung-Shi Chen, Cheng-Sian Chang, Jeng-Shian Lin, ...
MOBIHOC
2009
ACM
14 years 8 months ago
Efficient uncoordinated FHSS anti-jamming communication
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
Mario Strasser, Christina Pöpper, Srdjan Capk...
EDBT
2006
ACM
156views Database» more  EDBT 2006»
13 years 12 months ago
FlexInd: A Flexible and Parameterizable Air-Indexing Scheme for Data Broadcast Systems
Abstract. In wireless data broadcast systems, popular information is repetitively disseminated through possibly multiple communication channels to mobile clients using various type...
André Seifert, Jen-Jou Hung
ACSC
2008
IEEE
14 years 2 months ago
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
Abstract— Hybrid Wireless Mesh Networks are a combination of mobile ad hoc networks and infrastructure wireless mesh networks, consisting of two types of nodes: Mobile Mesh Clien...
Stephan Mir, Asad Amir Pirzada, Marius Portmann