t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Bluetooth is a wireless communication technology, aimed at supporting connectivity among close proximity mobile devices. Bluetooth enables the design of low-power, low-cost, and s...
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...