Sciweavers

1259 search results - page 89 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
WISEC
2009
ACM
14 years 2 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
EUC
2006
Springer
13 years 11 months ago
An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks
Abstract. In this paper, we propose a new medium access control protocol for wireless sensor networks, named LE-MAC (Latency and Energy aware MAC) that aims to minimize data delive...
Changsu Suh, Deepesh Man Shrestha, Young-Bae Ko
MONET
2002
117views more  MONET 2002»
13 years 7 months ago
A Service Management Framework for M-Commerce Applications
Mobile commerce (m-commerce) refers to an ability to conduct wireless commerce transactions using mobile applications in mobile devices. M-commerce applications can range from as s...
Gary Shih, Simon S. Y. Shim
GLOBECOM
2008
IEEE
14 years 2 months ago
Vertical Handoff between 802.11 and 802.16 Wireless Access Networks
—In this paper, we consider an interworking architecture of wireless mesh backbone and propose an effective vertical handoff scheme between 802.11 and 802.16 wireless access netw...
Yongqiang Zhang, Weihua Zhuang, Aladdin Saleh
WICON
2008
13 years 9 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...