Sciweavers

1259 search results - page 247 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
IEEESP
2006
130views more  IEEESP 2006»
13 years 9 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
AHSWN
2008
163views more  AHSWN 2008»
13 years 9 months ago
Control Frame Shaping in Power Controlled and Directional MAC Protocols?
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Fei Dai, Jie Wu
EUROCRYPT
2007
Springer
14 years 26 days ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
HICSS
2006
IEEE
134views Biometrics» more  HICSS 2006»
14 years 3 months ago
Differentiated Priority Scheduling and Adaptive Segmentation for Bluetooth Piconets
Bluetooth is a wireless communication technology, aimed at supporting connectivity among close proximity mobile devices. Bluetooth enables the design of low-power, low-cost, and s...
Jyothsna Kalvala, Gergely V. Záruba
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
14 years 2 months ago
Scatternet Formation of Bluetooth Ad Hoc Networks
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Bin Zhen, Jonghun Park, Yongsuk Kim