Sciweavers

442 search results - page 85 / 89
» An Energy-Conserving Access Protocol for Wireless Communicat...
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
PERCOM
2007
ACM
14 years 7 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
WISEC
2009
ACM
14 years 2 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
GLOBECOM
2007
IEEE
14 years 2 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
IASTEDSE
2004
13 years 9 months ago
A pro-active middleware platform for mobile environments
With wireless communications and mobile hand-held devices becoming a reality, new applications where users can have access to information anytime, anywhere are made possible. To d...
Denis Conan, Chantal Taconet, Dhouha Ayed, Lydiall...