Sciweavers

61 search results - page 8 / 13
» Architecting protocol stack optimizations on mobile devices
Sort
View
PERVASIVE
2007
Springer
14 years 24 days ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
ACSC
2007
IEEE
14 years 1 months ago
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol
Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be conside...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
PDCN
2007
13 years 8 months ago
An information service infrastructure for ambient networks
Communication environments are becoming increasingly more complex due to the diversity of available network technologies in terms of spatial coverage and design characteristics, a...
Raffaele Giaffreda, Kostas Pentikousis, Eleanor He...
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 8 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
PADS
2003
ACM
13 years 12 months ago
HLA-based Adaptive Distributed Simulation of Wireless Mobile Systems
Wireless networks’ models differ from wired ones at least in the innovative dynamic effects of host-mobility and open-broadcast nature of the wireless medium. Topology changes d...
Luciano Bononi, Gabriele D'Angelo, Lorenzo Donatie...